Vulnerability from csaf_opensuse
Published
2022-04-08 14:01
Modified
2022-04-08 14:01
Summary
Security update for opera

Notes

Title of the patch
Security update for opera
Description of the patch
This update for opera fixes the following issues: Update to 85.0.4341.28 - CHR-8816 Update chromium on desktop-stable-99-4341 to 99.0.4844.84 - DNA-98092 Crash at views::MenuItemView::GetMenuController() - DNA-98278 Translations for O85 - DNA-98320 [Mac] Unable to delete recent search entries - DNA-98614 Show recent searches for non-BABE users - DNA-98615 Allow removal of recent searches - DNA-98616 Add recent searches to ‘old’ BABE - DNA-98617 Make it possible to disable ad-blocker per-country - DNA-98651 Remove Instagram and Facebook Messenger in Russia - DNA-98653 Add flag #recent-searches - DNA-98696 smoketest PageInfoHistoryDataSourceTest.FormatTimestampString failing - DNA-98703 Port Chromium issue 1309225 to Opera Stable - The update to chromium 99.0.4844.84 fixes following issues: CVE-2022-1096 - Changes in 85.0.4341.18 - CHR-8789 Update chromium on desktop-stable-99-4341 to 99.0.4844.51 - DNA-98059 [Linux] Crash at opera::FreedomSettingsImpl::IsBypassForDotlessDomainsEnabled - DNA-98349 [Linux] Crash at bluez::BluezDBusManager::Get() - DNA-98126 System crash dialog shown on macOS <= 10.15 - DNA-98331 [Snap] Meme generator cropping / resizing broken - DNA-98394 Audio tab indicator set to 'muted' on videoconferencing sites - DNA-98481 Report errors in opauto_collector - The update to chromium 99.0.4844.51 fixes following issues: CVE-2022-0789, CVE-2022-0790, CVE-2022-0791, CVE-2022-0792, CVE-2022-0793, CVE-2022-0794, CVE-2022-0795, CVE-2022-0796, CVE-2022-0797, CVE-2022-0798, CVE-2022-0799, CVE-2022-0800, CVE-2022-0801, CVE-2022-0802, CVE-2022-0803, CVE-2022-0804, CVE-2022-0805, CVE-2022-0806, CVE-2022-0807, CVE-2022-0808, CVE-2022-0809 - Changes in 85.0.4341.13 - DNA-94119 Upgrade curl to 7.81.0 - DNA-97849 [Mac monterey] System shortcut interfere with Opera’s `ToggleSearchInOpenTabs` shortcut - DNA-98204 Automatic popout happens when video is paused - DNA-98231 Shortcuts are blocked by displayed tab tooltip when triggered quickly after tooltip appears - DNA-98321 Add thinlto-cache warnings to suppression list - DNA-98395 Promote O85 to stable - Complete Opera 85.0 changelog at: https://blogs.opera.com/desktop/changelog-for-85/ - Update to 84.0.4316.42 - DNA-94119 Upgrade curl to 7.81.0 - DNA-98092 Crash at views::MenuItemView::GetMenuController() - DNA-98204 Automatic popout happens when video is paused - DNA-98231 Shortcuts are blocked by displayed tab tooltip when triggered quickly after tooltip appears - Update to 84.0.4316.31 - CHR-8772 Update chromium on desktop-stable-98-4316 to 98.0.4758.109 - DNA-97573 [Win][Lin]”Close tab” button is not displayed on tabs playing media when many tabs are open - DNA-97729 cancelling the process uploading custom Wallpaper crashes the browser - DNA-97871 Google meet tab’s icons don’t fit on pinned tab - DNA-97872 Tab is being unpinned when video conferencing button is clicked - DNA-98039 Dark theme top sites have black background - DNA-98117 Clicking current tab information should hide tooltip - Update to 84.0.4316.21 - CHR-8762 Update chromium on desktop-stable-98-4316 to 98.0.4758.102 - DNA-97333 ‘Add a site’ label on start page tile barely visible - DNA-97691 Opera 84 translations - DNA-97767 Wrong string in FR - DNA-97855 Crash at ScopedProfileKeepAlive::~ScopedProfileKeepAlive() - DNA-97982 Enable #snap-upstream-implementation on all streams - The update to chromium 98.0.4758.102 fixes following issues: CVE-2022-0603, CVE-2022-0604, CVE-2022-0605, CVE-2022-0606, CVE-2022-0607, CVE-2022-0608, CVE-2022-0609, CVE-2022-0610 - Update to 84.0.4316.14 - CHR-8753 Update chromium on desktop-stable-98-4316 to 98.0.4758.82 - DNA-97177 Battery saver – the icon looks bad for DPI!=100% - DNA-97614 automatic video pop-out for most popular websites broadcasting Winter Olympic Games 2022 - DNA-97804 Promote O84 to stable - The update to chromium 98.0.4758.82 fixes following issues: CVE-2022-0452, CVE-2022-0453, CVE-2022-0454, CVE-2022-0455, CVE-2022-0456, CVE-2022-0457, CVE-2022-0458, CVE-2022-0459, CVE-2022-0460, CVE-2022-0461, CVE-2022-0462, CVE-2022-0463, CVE-2022-0464, CVE-2022-0465, CVE-2022-0466, CVE-2022-0467, CVE-2022-0468, CVE-2022-0469, CVE-2022-0470 - Complete Opera 84.0 changelog at: https://blogs.opera.com/desktop/changelog-for-84/ - Update to 83.0.4254.54 - DNA-96581 Fast tab tooltip doesn’t always show related sites with scrollable tab strip - DNA-96608 Cannot drag a tab to create a new window - DNA-96657 Do not make tab tooltip hoverable if there’s no list of tabs - DNA-97291 Crash at opera::flow::FlowSessionImpl::RegisterDevice(base::OnceCallback) - DNA-97468 Incorrect number of restored tabs when video-popout is detached - DNA-97476 Add retry to stapling during signing - DNA-97609 Failing MetricsReporterTest.TimeSpent* smoketests - Update to 83.0.4254.27 - CHR-8737 Update chromium on desktop-stable-97-4254 to 97.0.4692.99 - DNA-96336 [Mac] Translate new network installer slogan - DNA-96678 Add battery level monitoring capability to powerSavePrivate - DNA-96939 Crash at opera::ExternalVideoService::MarkAsManuallyClosed() - DNA-97276 Enable #static-tab-audio-indicator on all streams - The update to chromium 97.0.4692.99 fixes following issues: CVE-2022-0289, CVE-2022-0290, CVE-2022-0291, CVE-2022-0292, CVE-2022-0293, CVE-2022-0294, CVE-2022-0295, CVE-2022-0296, CVE-2022-0297, CVE-2022-0298, CVE-2022-0300, CVE-2022-0301, CVE-2022-0302, CVE-2022-0304, CVE-2022-0305, CVE-2022-0306, CVE-2022-0307, CVE-2022-0308, CVE-2022-0309, CVE-2022-0310, CVE-2022-0311 - Update to 83.0.4254.19 - DNA-96079 Turn on #automatic-video-popout on developer - DNA-97070 Opera 83 translations - DNA-97119 [LastCard] Stop showing used burner cards - DNA-97131 Enable automatic-video-popout on all streams from O84 on - DNA-97257 Crash at views::ImageButton::SetMinimumImageSize(gfx::Size const&) - DNA-97259 Promote O83 to stable - Complete Opera 83.0 changelog at: https://blogs.opera.com/desktop/changelog-for-83/ - Update to 83.0.4254.16 - DNA-96968 Fix alignment of the 'Advanced' button in Settings - Update to 83.0.4254.14 - CHR-8701 Update chromium on desktop-stable-97-4254 to 97.0.4692.45 - CHR-8713 Update chromium on desktop-stable-97-4254 to 97.0.4692.56 - CHR-8723 Update chromium on desktop-stable-97-4254 to 97.0.4692.71 - DNA-96780 Crash at ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*) - DNA-96822 Tab close resize behavior change - DNA-96861 Create Loomi Options menu - DNA-96904 Support Win11 snap layout popup - DNA-96951 Tab close animation broken - DNA-96991 Tab X button doesn’t work correctly - DNA-97027 Incorrect tab size after tab close - The update to chromium 97.0.4692.71 fixes following issues: CVE-2022-0096, CVE-2022-0097, CVE-2022-0098, CVE-2022-0099, CVE-2022-0100, CVE-2022-0101, CVE-2022-0102, CVE-2022-0103, CVE-2022-0104, CVE-2022-0105, CVE-2022-0105, CVE-2022-0106, CVE-2022-0107, CVE-2022-0108, CVE-2022-0109, CVE-2022-0110, CVE-2022-0111, CVE-2022-0111, CVE-2022-0112, CVE-2022-0113, CVE-2022-0114, CVE-2022-0115, CVE-2022-0116, CVE-2022-0117, CVE-2022-0118, CVE-2022-0120 - Update to version 82.0.4227.58 - DNA-96780 Crash at ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*) - DNA-96890 Settings default browser not working for current user on Windows 7 - Update to version 82.0.4227.43 - CHR-8705 Update chromium on desktop-stable-96-4227 to 96.0.4664.110 - DNA-93284 Unstable obj/opera/desktop/common/installer_rc_generated/installer.res - DNA-95908 Interstitial/internal pages shown as NOT SECURE after visiting http site - DNA-96404 Opera doesn’t show on main screen when second screen is abruptly disconnected - The update to chromium 96.0.4664.110 fixes following issues: CVE-2021-4098, CVE-2021-4099, CVE-2021-4100, CVE-2021-4101, CVE-2021-4102 - Update to version 82.0.4227.33 - CHR-8689 Update chromium on desktop-stable-96-4227 to 96.0.4664.93 - DNA-96559 Tooltip popup looks bad in dark theme - DNA-96570 [Player] Tidal logging in via PLAY doesn’t work - DNA-96594 Unnecessary extra space in fullscreen mode on M1 Pro MacBooks - DNA-96649 Update Meme button - DNA-96676 Add Icon in the Sidebar Setup - DNA-96677 Add default URL - The update to chromium 96.0.4664.93 fixes following issues: CVE-2021-4052, CVE-2021-4053, CVE-2021-4079, CVE-2021-4054, CVE-2021-4078, CVE-2021-4055, CVE-2021-4056, CVE-2021-4057, CVE-2021-4058, CVE-2021-4059, CVE-2021-4061, CVE-2021-4062, CVE-2021-4063, CVE-2021-4064, CVE-2021-4065, CVE-2021-4066, CVE-2021-4067, CVE-2021-4068 - Update to version 82.0.4227.23 - DNA-95632 With new au-logic UUID is set with delay and may be not set for pb-builds (when closing fast) - DNA-96349 Laggy tooltip animation - DNA-96483 [Snap][Linux] Video not working / wrong ffmpeg snap version for Opera 82 - DNA-96493 Create 'small' enticement in credit card autofill - DNA-96533 Opera 82 translations - DNA-96535 Make the URL configurable - DNA-96553 Add switch to whitelist test pages - DNA-96557 Links not opened from panel - DNA-96558 AdBlock bloks some trackers inside the panel - DNA-96568 [Player] Tidal in sidebar Player opens wrong site when logging in - DNA-96659 Siteprefs not applied after network service crash - DNA-96593 Promote O82 to stable - Complete Opera 82.0 changelog at: https://blogs.opera.com/desktop/changelog-for-82/ - Update to version 82.0.4227.13 - CHR-8668 Update chromium on desktop-stable-96-4227 to 96.0.4664.45 - DNA-76987 [Mac] Update desktop EULA with geolocation split - DNA-93388 Problem with symlinks on windows when creating file list - DNA-95734 Discarded Recently Closed items get revived after restart - DNA-96134 'Your profile has been updated' does not disappear - DNA-96190 Opera freezes when trying to drag expanded bookmark folder with nested subfolders - DNA-96223 Easy Files not working in Full Screen - DNA-96274 Checkout autofill shouldn't show used burner card - DNA-96275 Change the notification message for pausing multi-use cards - DNA-96295 'Video pop out' setting doesn't sync - DNA-96316 Highlight text wrong colour on dark mode - DNA-96326 Wrong translation Private Mode > Turkish - DNA-96351 macOS window controls are missing in full screen - DNA-96440 Update video URL - DNA-96448 add option to pin extension via rich hints - DNA-96453 Register user-chosen option on client-side, read on hint side - DNA-96454 Choosing an option from the settings menu should close the popup - DNA-96484 Enable AB test for a new autoupdater logic (for 50%) - DNA-96500 Add 'don't show me again' prefs to allowed whitelist - DNA-96538 Inline audiocomplete for www.mediaexpert.pl incorrectly suggested - The update to chromium 96.0.4664.45 fixes following issues: CVE-2021-38005, CVE-2021-38006, CVE-2021-38007, CVE-2021-38008, CVE-2021-38009, CVE-2021-38010, CVE-2021-38011, CVE-2021-38012, CVE-2021-38013, CVE-2021-38014, CVE-2021-38015, CVE-2021-38016, CVE-2021-38017, CVE-2021-38019, CVE-2021-38020, CVE-2021-38021, CVE-2021-38022 - Update to version 81.0.4196.54 - CHR-8644 Update chromium on desktop-stable-95-4196 to 95.0.4638.69 - DNA-95773 ExtensionWebRequestApiTest crashes on mac - DNA-96062 Opera 81 translations - DNA-96134 “Your profile has been updated’ does not disappear - DNA-96274 Checkout autofill shouldn’t show used burner card - DNA-96275 Change the notification message for pausing multi-use cards - DNA-96440 Update video URL - The update to chromium 95.0.4638.69 fixes following issues: CVE-2021-37997, CVE-2021-37998, CVE-2021-37999, CVE-2021-37980, CVE-2021-38001, CVE-2021-38002, CVE-2021-38003, CVE-2021-38004 - Update to version 81.0.4196.37 - DNA-96008 Crash at content::WebContentsImpl::OpenURL(content::OpenURLParams const&) - DNA-96032 Closing the videoconference pop-up force leaving the meeting - DNA-96092 Crash at void opera::ModalDialogViews::OnWidgetClosing(opera::ModalDialog::Result) - DNA-96142 [Yat] Emoji icon cut off in URL for Yat - Update to version 81.0.4196.31 - DNA-95733 Implement the “Manage” menu in card details view - DNA-95736 Update UI for paused card - DNA-95791 Crash at base::operator< - DNA-95794 Sometimes the sidebar UI fails to load - DNA-95812 Retrieve cards info when showing autofill - DNA-96035 Cannot create virtual card on Sandbox environment - DNA-96147 “Buy” button does not work - DNA-96168 Update contributors list - DNA-96211 Enable #fast-tab-tooltip on all streams - DNA-96231 Promote O81 to stable - Complete Opera 80.1 changelog at: https://blogs.opera.com/desktop/changelog-for-81/ - Update to version 81.0.4196.27 - CHR-8623 Update chromium on desktop-stable-95-4196 to 95.0.4638.54 - DNA-92384 Better segmenting of hint users - DNA-95523 Allow sorting in multi-card view - DNA-95659 Flow of Lastcard on first login - DNA-95735 Implement the button that reveals full card details - DNA-95747 Better way to handle expired funding card - DNA-95949 [Mac Retina] Clicking active tab should scroll to the top - DNA-95993 Update icon used for Yat in address bar dropdown - DNA-96021 Cleared download item view is never deleted - DNA-96036 Occupation field in 'Account – Edit' is shown twice - DNA-96127 Upgrade plan button does nothing - DNA-96138 'Add Card' button does not change to 'Upgrade Plan' after adding card - The update to chromium 95.0.4638.54 fixes following issues: CVE-2021-37981, CVE-2021-37982, CVE-2021-37983, CVE-2021-37984, CVE-2021-37985, CVE-2021-37986, CVE-2021-37987, CVE-2021-37988, CVE-2021-37989, CVE-2021-37990, CVE-2021-37991, CVE-2021-37992, CVE-2021-37993, CVE-2021-37994, CVE-2021-37995, CVE-2021-37996 - Update to version 80.0.4170.72 - DNA-95522 Change card view to show all types of cards - DNA-95523 Allow sorting in multi-card view - DNA-95524 Allow searching for cards by name - DNA-95658 Allow user to add a card - DNA-95659 Flow of Lastcard on first login - DNA-95660 Implement editing card details - DNA-95699 Add card details view - DNA-95733 Implement the “Manage” menu in card details view - DNA-95735 Implement the button that reveals full card details - DNA-95736 Update UI for paused card - DNA-95747 Better way to handle expired funding card - DNA-95794 Sometimes the sidebar UI fails to load - DNA-95812 Retrieve cards info when showing autofill - DNA-96036 Occupation field in ‘Account – Edit’ is shown twice - DNA-96127 Upgrade plan button does nothing - DNA-96138 “Add Card” button does not change to “Upgrade Plan” after adding card - Update to version 80.0.4170.63 - CHR-8612 Update chromium on desktop-stable-94-4170 to 94.0.4606.81 - DNA-95434 Crash at opera::ThemesService::UpdateCurrentTheme() - The update to chromium 94.0.4606.81 fixes following issues: CVE-2021-37977, CVE-2021-37978, CVE-2021-37979, CVE-2021-37980 - Update to version 80.0.4170.40 - CHR-8598 Update chromium on desktop-stable-94-4170 to 94.0.4606.71 - DNA-95221 Emoji button stuck in address bar - DNA-95325 Make y.at navigations to be reported with page_views events - DNA-95327 Add “Emojis” context menu option in address bar field - DNA-95339 Add YAT emoji url suggestion to search© dialog - DNA-95416 Remove emoji button from address bar - DNA-95439 Enable #yat-emoji-addresses on developer stream - DNA-95441 [Mac big sur] Emoji are not shown in address bar url - DNA-95514 Crash at resource_coordinator::TabLifecycleUnitSource ::TabLifecycleUnit::OnLifecycleUnitStateChanged(mojom:: LifecycleUnitState, mojom::LifecycleUnitStateChangeReason) - DNA-95746 Enable #reader-mode everywhere - DNA-95865 Numbers are recognized as emojis - DNA-95866 Change Yat text in selection popup - DNA-95867 Show that buttons are clickable in selection popup - The update to chromium 94.0.4606.71 fixes following issues: CVE-2021-37974, CVE-2021-37975, CVE-2021-37976 - Update to version 80.0.4170.16 - CHR-8590 Update chromium on desktop-stable-94-4170 to 94.0.4606.61 - DNA-95347 Make InstallerStep::Run async - DNA-95420 First suggestion in address field is often not highlighted - DNA-95613 Browser closing itself after closing SD/first tab and last opened tab - DNA-95725 Promote O80 to stable - DNA-95781 Import fixes for CVE-2021-37975, CVE-2021-37976 and CVE-2021-37974 to desktop-stable-94-4170 - Complete Opera 80.0 changelog at: https://blogs.opera.com/desktop/changelog-for-80/ - Drop Provides/Obsoletes for opera-gtk and opera-kde4 opera-gtk and opera-kde4 were last used in openSUSE 13.1 - Drop post/postun for desktop_database_post and icon_theme_cache_post because were last used before openSUSE 15.0 - Update to version 79.0.4143.72 - DNA-94933 Add emoji panel to address bar - DNA-95210 Add emoji YAT address bar suggestions - DNA-95221 Emoji button stuck in address bar - DNA-95325 Make y.at navigations to be reported with page_views events - DNA-95327 Add “Emojis” context menu option in address bar field - DNA-95339 Add YAT emoji url suggestion to search© dialog - DNA-95364 Add browser feature flag - DNA-95416 Remove emoji button from address bar - DNA-95439 Enable #yat-emoji-addresses on developer stream - DNA-95441 [Mac big sur] Emoji are not shown in address bar url - DNA-95445 Crash when removing unsynced pinboard bookmark with sync enabled - DNA-95512 Allow to show title and timer for simple banners - DNA-95516 Wrong label in settings for themes - DNA-95679 Temporarily disable AB test for a new autoupdater logic - Update to version 79.0.4143.50 - CHR-8571 Update chromium on desktop-stable-93-4143 to 93.0.4577.82 - DNA-94104 ContinueShoppingOnEbayBrowserTest.ShouldDisplayOffers TilesStartingWithMostActiveOnes fails - DNA-94894 [Rich Hint] Agent API permissions - DNA-94989 Wrong color and appearance of subpages in the settings - DNA-95241 “Switch to tab” button is visible only on hover - DNA-95286 Add unit tests to pinboard sync related logic in browser - DNA-95372 [Mac retina screen] Snapshot doesnt capture cropped area - DNA-95526 Some webstore extensions are not verified properly - The update to chromium 93.0.4577.82 fixes following issues: CVE-2021-30625, CVE-2021-30626, CVE-2021-30627, CVE-2021-30628, CVE-2021-30629, CVE-2021-30630, CVE-2021-30631, CVE-2021-30632, CVE-2021-30633 - Update to version 79.0.4143.22 - CHR-8550 Update chromium on desktop-stable-93-4143 to 93.0.4577.58 - CHR-8557 Update chromium on desktop-stable-93-4143 to 93.0.4577.63 - DNA-94641 [Linux] Proprietary media codecs not working in snap builds - DNA-95076 [Linux] Page crash with media content - DNA-95084 [Mac] Cannot quit through menu with snapshot editor open - DNA-95138 Add setting to synchronize Pinboards - DNA-95157 Crash at -[OperaCrApplication sendEvent:] - DNA-95204 Opera 79 translations - DNA-95240 The pinboard thumbnail cannot be generated anymore - DNA-95278 Existing Pinboards might be missing - DNA-95292 Enable #bookmarks-trash-cleaner on all streams - DNA-95293 Enable #easy-files-downloads-folder on all streams - DNA-95383 Promote O79 to stable - Complete Opera 79.0 changelog at: https://blogs.opera.com/desktop/changelog-for-79/ - The update to chromium 93.0.4577.58 fixes following issues: CVE-2021-30606, CVE-2021-30607, CVE-2021-30608, CVE-2021-30609, CVE-2021-30610, CVE-2021-30611, CVE-2021-30612, CVE-2021-30613, CVE-2021-30614, CVE-2021-30615, CVE-2021-30616, CVE-2021-30617, CVE-2021-30618, CVE-2021-30619, CVE-2021-30620, CVE-2021-30621, CVE-2021-30622, CVE-2021-30623, CVE-2021-30624 - Update to version 78.0.4093.184 - CHR-8533 Update chromium on desktop-stable-92-4093 to 92.0.4515.159 - DNA-93472 Reattaching to other browsers - DNA-93741 Multiple hint slots - DNA-93742 Allow displaying unobtrusive external hints - DNA-93744 Add slots in toolbar action view - DNA-94230 Improve text contrast for Speed Dials - DNA-94724 [Mac] Add macOS dark theme wallpaper with easy setup - DNA-94786 Crash at base::SupportsUserData:: SetUserData(void const*, std::__1::unique_ptr) - DNA-94807 Allow scripts access opera version and product info - DNA-94862 Continue on shopping Amazon doesn’t work correct - DNA-94870 Add an addonsPrivate function to install with permissions dialog first - DNA-95064 Revert DNA-93714 on stable - The update to chromium 92.0.4515.159 fixes following issues: CVE-2021-30598, CVE-2021-30599, CVE-2021-30600, CVE-2021-30601, CVE-2021-30602, CVE-2021-30603, CVE-2021-30604 - Update to version 78.0.4093.147 - CHR-8251 Update chromium on desktop-stable-92-4093 to 92.0.4515.131 - DNA-93036 Opera not starting after closing window. Processes still working. - DNA-94516 Add ‘Detach tab’ entry to tab menu - DNA-94584 [Mac] Sidebar setup not closed after press ‘Add extensions’ button - DNA-94761 Crash when trying to record “Chrome developer” trace - DNA-94790 Crash at opera::VideoConferenceTabDetachController:: OnBrowserAboutToStartClosing(Browser*) - The update to chromium 92.0.4515.131 fixes following issues: CVE-2021-30590, CVE-2021-30591, CVE-2021-30592, CVE-2021-30593, CVE-2021-30594, CVE-2021-30596, CVE-2021-30597 - Update to version 78.0.4093.112 - DNA-94466 Implement sorting Pinboards in overview - DNA-94582 Add access to APIs for showing pinboard icon in sidebar - DNA-94603 Suspicious pinboards events - DNA-94625 Disable opr.pinboardPrivate.getThumbnail() for local files - DNA-94640 Promote O78 to stable - DNA-94661 Missing translations for some languages - Complete Opera 78.0 changelog at: https://blogs.opera.com/desktop/changelog-for-78/ - Update to version 77.0.4054.277 - CHR-8502 Update chromium on desktop-stable-91-4054 to 91.0.4472.164 - DNA-94291 Video conference popout doesnt remember its size after resizing - DNA-94399 Incorrect icon for wp.pl in address bar dropdown - DNA-94462 Low quality of default wallpaper on windows - The update to chromium 91.0.4472.164 fixes following issues: CVE-2021-30541, CVE-2021-30560, CVE-2021-30561, CVE-2021-30562, CVE-2021-30563, CVE-2021-30564 - Update to version 77.0.4054.254 - DNA-92344 Windows 10 Implementation - DNA-92486 Replace ⓧ icon with “settings” icon - DNA-92487 Close individual item - DNA-92496 Create separate entry in settings for BABE - DNA-93275 Implement cycles size according to design - DNA-93280 The system theme has only half a checkmark - DNA-93728 Whatsapp notification is not refreshed - DNA-94047 Remove pinboard WebUI integration - DNA-94118 Write test for ThumbnailTabHelper changes in DNA-94100 - DNA-94120 Fix Welcome popup layout - DNA-94140 Crash at base::TaskRunner ::PostTask(base::Location const&, base::OnceCallback) - DNA-94205 Consider setting pinboard display URL in address_field_helper.cc - DNA-94211 Easy Files don’t show thumbnails - DNA-94309 Pinboards URLs don’t get lighter color treatment - DNA-94318 Wrong ‘Transparency’ word translation in Swedish - DNA-94321 AB test: google suggestions on top – bigger test - DNA-94341 Make pinboard popup testable on web page - DNA-94381 Disabling Pinboards doesn’t remove item from menu / sidebar - DNA-94392 Add u2f-devices interface to snap packages - DNA-94461 Enable #system-theme on all streams - Update to version 77.0.4054.203 - CHR-8475 Update chromium on desktop-stable-91-4054 to 91.0.4472.124 - DNA-93523 Crash at extensions::TabHelper::WebContentsDestroyed() - DNA-93917 Upload snap to edge while preparing repository package - DNA-94157 Crash at gfx::ICCProfile::operator=(gfx::ICCProfile const&) - DNA-94159 Crash at opera::auth::AuthAccountServiceImpl::GetAuthAccount() - DNA-94161 [Add tabs]Unexpected symbols instead of Workspace name - DNA-94241 Implement better process killing for timeout - DNA-94248 Allow retry on tests that timed-out - DNA-94251 heap-use-after-free in VideoConference - DNA-94315 Crash at class std::__1::basic_string ui::ResourceBundle:: LoadLocaleResources(const class std::__1::basic_string& const, bool) - DNA-94357 Fix issue in scripts - Update to version 77.0.4054.172 - DNA-93078 Do not display ‘share tab’ sliding toolbar on detached tab - DNA-93358 The red underline extends beyond the Google meets conference tab outline - DNA-93404 Crash in test when destroying BABE’s webcontents - DNA-93637 ctrl+9 shortcut is inconsistent with other browsers - DNA-93661 Add opauto test to cover new shortcut from DNA-93637 - DNA-93867 Use version from package instead of repository - DNA-93993 Pinboard translations from Master - DNA-94099 Increase new-autoupdater-logic AB test to cover 50% of new installations - DNA-94100 Thumbnail doesn’t update - DNA-94178 Automatic popout should not happen after manually closing a popout - Update to version 77.0.4054.146 - CHR-8458 Update chromium on desktop-stable-91-4054 to 91.0.4472.114 - DNA-92171 Create active linkdiscovery service - DNA-92388 Fix and unskip WorkspacesEmoji.testChooseEmojiAsWorkspaceIcon when possible - DNA-93101 Tabs are being snoozed when tab snoozing is disabled - DNA-93386 Update pinboard view when item changes - DNA-93448 Make browser ready for Developer release - DNA-93491 Fix failing tests after enabling #pinboard flag - DNA-93498 Add additional music services - DNA-93503 Blank popup on clicking toolbar icon with popup open - DNA-93561 Do not allow zoom different from 100% in Pinboard popup - DNA-93637 ctrl+9 shortcut is inconsistent with other browsers - DNA-93644 Create route for `import open tabs` to `pinboard` - DNA-93664 Adapt popup to design - DNA-93702 Turn on flags on developer - DNA-93737 [Pinboard] Remove Mock API - DNA-93745 Unable to open the popup after opening it several times - DNA-93776 Popup closes and reopens when clicking the toolbar button - DNA-93786 DCHECK after opening popup - DNA-93802 Crash at views::Widget::GetNativeView() const - DNA-93810 Add pinboard icon to sidebar - DNA-93825 Add pinboard to Opera menu - DNA-93833 [Player] Implement seeking for new services - DNA-93845 Do not log output of snapcraft on console - DNA-93864 Create feature flag for start page sync banner - DNA-93865 Implement start page banner - DNA-93867 Use version from package instead of repository - DNA-93878 [Player] Crash when current player service becomes unavailable when user location changes - DNA-93953 ‘Send image to Pinboard’ has the wrong position in the context menu - DNA-93987 Disable zooming popup contents like in other popups - DNA-93989 Change internal URL to opera://pinboards - DNA-93990 Update strings to reflect new standards - DNA-93992 Add Pinboards to Opera settings - DNA-93993 Pinboard translations from Master - DNA-94011 Enable feature flags for Reborn 5 on stable - DNA-94019 Add a direct link to settings - DNA-94088 Internal pages provoke not saving other pages to the Pinboard - DNA-94111 [O77] Sidebar setup does not open - DNA-94139 Crash at opera::(anonymous namespace)::PinboardPopupWebView::RemovedFromWidget() - The update to chromium 91.0.4472.114 fixes following issues: CVE-2021-30554, CVE-2021-30555, CVE-2021-30556, CVE-2021-30557 - Update to version 77.0.4054.90 - CHR-8446 Update chromium on desktop-stable-91-4054 to 91.0.4472.101 - The update to chromium 91.0.4472.101 fixes following issues: CVE-2021-30544, CVE-2021-30545, CVE-2021-30546, CVE-2021-30547, CVE-2021-30548, CVE-2021-30549, CVE-2021-30550, CVE-2021-30551, CVE-2021-30552, CVE-2021-30553 - Update to version 77.0.4054.80 - DNA-93656 Active cards in checkout Auto-fill - DNA-93805 Create snap packages in buildsign - DNA-93823 archive_opera_snap failures on Linux - DNA-93844 Fix AttributeError in package_type.py - Update to version 77.0.4054.64 - DNA-93159 Implement image(preview) of each created pinboard - DNA-93273 ‘Send image to Pinboard’ doesn’t work correct on staging server - DNA-93277 Add/update opauto tests for the System Theme WP1 implementation p.1 - DNA-93286 [BigSur] YT not being reloaded when opened from link - DNA-93296 Opera 77 translations - DNA-93372 Build new edition for Axel Springer - DNA-93376 Write unittests for PinboardImageCollector - DNA-93401 [LastCard] Do not change user state if not needed - DNA-93409 Animation with hat and glasses is missing in Private mode - DNA-93443 API opr.pinboardPrivate.getThumbnail() returns old thumbnail image - DNA-93509 Add Opera switch for pinboard staging backend and use it for tests - DNA-93519 [Sidebar] WhatsApp ‘Log out’ doesn’t work - DNA-93634 Fix errors in Slovak translations - DNA-93724 Some webstore extensions are not verified properly - Complete Opera 77.0 changelog at: https://blogs.opera.com/desktop/changelog-for-77/ - Update to version 76.0.4017.177 - DNA-92597 Sound controller doesn’t work after pressing ‘Next’ button - DNA-93405 Import vmp_signer instead of starting new python process - DNA-93406 [Mac] Import plist_util instead of calling script in _generateAppEntitlements - DNA-93442 Make GX Control panel attachable by webdriver - DNA-93554 [AdBlock] Find a fix for blocking ‘new’ YouTube ads - DNA-93587 Pre-refactor solution - Update to version 76.0.4017.154 - CHR-8420 Update chromium on desktop-stable-90-4017 to 90.0.4430.212 - DNA-92411 Bookmarks breadcrumbs wrong color when pressed in dark mode - DNA-92587 Sync settings: “Use old password” button doesn’t work - DNA-92672 Make it possible for agent to inject scripts into startpage - DNA-92712 Add SD reload API - DNA-93190 The bookmark can’t be opened in Workspace 5-6 - DNA-93247 Reopen last closed tab shortcut opens random tab on new window - DNA-93294 Binary diff for opera_browser.dll is not created on 32-bit builds - DNA-93313 Add opauto test to cover DNA-93190 - DNA-93368 Fix an error in Polish translation - DNA-93408 [Windows] widevine_cdm_component_installer does not compile on desktop-stable-90-4017 - The update to chromium 90.0.4430.212 fixes following issues: CVE-2021-30506, CVE-2021-30507, CVE-2021-30508, CVE-2021-30509, CVE-2021-30510, CVE-2021-30511, CVE-2021-30512, CVE-2021-30513, CVE-2021-30514, CVE-2021-30515, CVE-2021-30516, CVE-2021-30517, CVE-2021-30518, CVE-2021-30519, CVE-2021-30520
Patchnames
openSUSE-2022-110
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for opera",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for opera fixes the following issues:\n\nUpdate to 85.0.4341.28\n\n  - CHR-8816 Update chromium on desktop-stable-99-4341\n    to 99.0.4844.84\n  - DNA-98092 Crash at views::MenuItemView::GetMenuController()\n  - DNA-98278 Translations for O85\n  - DNA-98320 [Mac] Unable to delete recent search entries\n  - DNA-98614 Show recent searches for non-BABE users\n  - DNA-98615 Allow removal of recent searches\n  - DNA-98616 Add recent searches to \u2018old\u2019 BABE\n  - DNA-98617 Make it possible to disable ad-blocker per-country\n  - DNA-98651 Remove Instagram and Facebook Messenger in Russia\n  - DNA-98653 Add flag #recent-searches\n  - DNA-98696 smoketest \n    PageInfoHistoryDataSourceTest.FormatTimestampString failing\n  - DNA-98703 Port Chromium issue 1309225 to Opera Stable\n\n- The update to chromium 99.0.4844.84 fixes following issues:  \n  CVE-2022-1096\n- Changes in 85.0.4341.18\n\n  - CHR-8789 Update chromium on desktop-stable-99-4341 to\n    99.0.4844.51\n  - DNA-98059 [Linux] Crash at\n    opera::FreedomSettingsImpl::IsBypassForDotlessDomainsEnabled\n  - DNA-98349 [Linux] Crash at bluez::BluezDBusManager::Get()\n  - DNA-98126 System crash dialog shown on macOS \u003c= 10.15\n  - DNA-98331 [Snap] Meme generator cropping / resizing broken\n  - DNA-98394 Audio tab indicator set to \u0027muted\u0027 on\n    videoconferencing sites\n  - DNA-98481 Report errors in opauto_collector\n- The update to chromium 99.0.4844.51 fixes following issues:\n  CVE-2022-0789, CVE-2022-0790, CVE-2022-0791, CVE-2022-0792,\n  CVE-2022-0793, CVE-2022-0794, CVE-2022-0795, CVE-2022-0796,\n  CVE-2022-0797, CVE-2022-0798, CVE-2022-0799, CVE-2022-0800,\n  CVE-2022-0801, CVE-2022-0802, CVE-2022-0803, CVE-2022-0804,\n  CVE-2022-0805, CVE-2022-0806, CVE-2022-0807, CVE-2022-0808,\n  CVE-2022-0809\n\n- Changes in 85.0.4341.13\n\n  - DNA-94119 Upgrade curl to 7.81.0\n  - DNA-97849 [Mac monterey] System shortcut interfere with\n    Opera\u2019s `ToggleSearchInOpenTabs` shortcut\n  - DNA-98204 Automatic popout happens when video is paused\n  - DNA-98231 Shortcuts are blocked by displayed tab tooltip\n    when triggered quickly after tooltip appears\n  - DNA-98321 Add thinlto-cache warnings to suppression list\n  - DNA-98395 Promote O85 to stable\n\n- Complete Opera 85.0 changelog at:\n  https://blogs.opera.com/desktop/changelog-for-85/\n\n- Update to 84.0.4316.42\n\n  - DNA-94119 Upgrade curl to 7.81.0\n  - DNA-98092 Crash at views::MenuItemView::GetMenuController()\n  - DNA-98204 Automatic popout happens when video is paused\n  - DNA-98231 Shortcuts are blocked by displayed tab tooltip when\n    triggered quickly after tooltip appears\n\n- Update to 84.0.4316.31\n  - CHR-8772 Update chromium on desktop-stable-98-4316 to\n    98.0.4758.109\n  - DNA-97573 [Win][Lin]\u201dClose tab\u201d button is not displayed on tabs\n    playing media when many tabs are open\n  - DNA-97729 cancelling the process uploading custom Wallpaper\n    crashes the browser\n  - DNA-97871 Google meet tab\u2019s icons don\u2019t fit on pinned tab\n  - DNA-97872 Tab is being unpinned when video conferencing\n    button is clicked\n  - DNA-98039 Dark theme top sites have black background\n  - DNA-98117 Clicking current tab information should hide tooltip\n\n- Update to 84.0.4316.21\n  - CHR-8762 Update chromium on desktop-stable-98-4316 to\n    98.0.4758.102\n  - DNA-97333 \u2018Add a site\u2019 label on start page tile barely visible\n  - DNA-97691 Opera 84 translations\n  - DNA-97767 Wrong string in FR\n  - DNA-97855 Crash at\n    ScopedProfileKeepAlive::~ScopedProfileKeepAlive()\n  - DNA-97982 Enable #snap-upstream-implementation on all streams\n- The update to chromium 98.0.4758.102 fixes following issues:\n  CVE-2022-0603, CVE-2022-0604, CVE-2022-0605, CVE-2022-0606, \n  CVE-2022-0607, CVE-2022-0608, CVE-2022-0609, CVE-2022-0610\n\n- Update to 84.0.4316.14\n  - CHR-8753 Update chromium on desktop-stable-98-4316 to\n    98.0.4758.82\n  - DNA-97177 Battery saver \u2013 the icon looks bad for DPI!=100%\n  - DNA-97614 automatic video pop-out for most popular websites\n    broadcasting Winter Olympic Games 2022\n  - DNA-97804 Promote O84 to stable\n- The update to chromium 98.0.4758.82 fixes following issues:\n  CVE-2022-0452, CVE-2022-0453, CVE-2022-0454, CVE-2022-0455,\n  CVE-2022-0456, CVE-2022-0457, CVE-2022-0458, CVE-2022-0459,\n  CVE-2022-0460, CVE-2022-0461, CVE-2022-0462, CVE-2022-0463,\n  CVE-2022-0464, CVE-2022-0465, CVE-2022-0466, CVE-2022-0467,\n  CVE-2022-0468, CVE-2022-0469, CVE-2022-0470\n- Complete Opera 84.0 changelog at:\n  https://blogs.opera.com/desktop/changelog-for-84/\n\n- Update to 83.0.4254.54\n  - DNA-96581 Fast tab tooltip doesn\u2019t always show related sites\n    with scrollable tab strip\n  - DNA-96608 Cannot drag a tab to create a new window\n  - DNA-96657 Do not make tab tooltip hoverable if there\u2019s no\n    list of tabs\n  - DNA-97291 Crash at \n    opera::flow::FlowSessionImpl::RegisterDevice(base::OnceCallback)\n  - DNA-97468 Incorrect number of restored tabs when video-popout\n    is detached\n  - DNA-97476 Add retry to stapling during signing\n  - DNA-97609 Failing MetricsReporterTest.TimeSpent* smoketests\n\n- Update to 83.0.4254.27\n  - CHR-8737 Update chromium on desktop-stable-97-4254 to\n    97.0.4692.99\n  - DNA-96336 [Mac] Translate new network installer slogan\n  - DNA-96678 Add battery level monitoring capability to\n    powerSavePrivate\n  - DNA-96939 Crash at \n    opera::ExternalVideoService::MarkAsManuallyClosed()\n  - DNA-97276 Enable #static-tab-audio-indicator on all streams\n- The update to chromium 97.0.4692.99 fixes following issues:\n  CVE-2022-0289, CVE-2022-0290, CVE-2022-0291, CVE-2022-0292,\n  CVE-2022-0293, CVE-2022-0294, CVE-2022-0295, CVE-2022-0296,\n  CVE-2022-0297, CVE-2022-0298, CVE-2022-0300, CVE-2022-0301,\n  CVE-2022-0302, CVE-2022-0304, CVE-2022-0305, CVE-2022-0306,\n  CVE-2022-0307, CVE-2022-0308, CVE-2022-0309, CVE-2022-0310,\n  CVE-2022-0311\n\n- Update to 83.0.4254.19\n  - DNA-96079 Turn on #automatic-video-popout on developer\n  - DNA-97070 Opera 83 translations\n  - DNA-97119 [LastCard] Stop showing used burner cards\n  - DNA-97131 Enable automatic-video-popout on all streams from\n    O84 on\n  - DNA-97257 Crash at \n    views::ImageButton::SetMinimumImageSize(gfx::Size const\u0026)\n  - DNA-97259 Promote O83 to stable\n- Complete Opera 83.0 changelog at:\n  https://blogs.opera.com/desktop/changelog-for-83/\n- Update to 83.0.4254.16\n  - DNA-96968 Fix alignment of the \u0027Advanced\u0027 button in Settings\n- Update to 83.0.4254.14\n  - CHR-8701 Update chromium on desktop-stable-97-4254 to\n    97.0.4692.45\n  - CHR-8713 Update chromium on desktop-stable-97-4254 to\n    97.0.4692.56\n  - CHR-8723 Update chromium on desktop-stable-97-4254 to\n    97.0.4692.71\n  - DNA-96780 Crash at\n    ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)\n  - DNA-96822 Tab close resize behavior change\n  - DNA-96861 Create Loomi Options menu\n  - DNA-96904 Support Win11 snap layout popup\n  - DNA-96951 Tab close animation broken\n  - DNA-96991 Tab X button doesn\u2019t work correctly\n  - DNA-97027 Incorrect tab size after tab close\n- The update to chromium 97.0.4692.71 fixes following issues:\n  CVE-2022-0096, CVE-2022-0097, CVE-2022-0098, CVE-2022-0099,\n  CVE-2022-0100, CVE-2022-0101, CVE-2022-0102, CVE-2022-0103,\n  CVE-2022-0104, CVE-2022-0105, CVE-2022-0105, CVE-2022-0106,\n  CVE-2022-0107, CVE-2022-0108, CVE-2022-0109, CVE-2022-0110,\n  CVE-2022-0111, CVE-2022-0111, CVE-2022-0112, CVE-2022-0113,\n  CVE-2022-0114, CVE-2022-0115, CVE-2022-0116, CVE-2022-0117,\n  CVE-2022-0118, CVE-2022-0120\n\n- Update to version 82.0.4227.58\n  - DNA-96780 Crash at\n    ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)\n  - DNA-96890 Settings default browser not working for current\n    user on Windows 7\n\n- Update to version 82.0.4227.43\n  - CHR-8705 Update chromium on desktop-stable-96-4227 to\n    96.0.4664.110\n  - DNA-93284 Unstable\n    obj/opera/desktop/common/installer_rc_generated/installer.res\n  - DNA-95908 Interstitial/internal pages shown as NOT SECURE\n    after visiting http site\n  - DNA-96404 Opera doesn\u2019t show on main screen when second screen\n    is abruptly disconnected\n- The update to chromium 96.0.4664.110 fixes following issues:\n  CVE-2021-4098, CVE-2021-4099, CVE-2021-4100, CVE-2021-4101,\n  CVE-2021-4102\n\n- Update to version 82.0.4227.33\n  - CHR-8689 Update chromium on desktop-stable-96-4227 to\n    96.0.4664.93\n  - DNA-96559 Tooltip popup looks bad in dark theme\n  - DNA-96570 [Player] Tidal logging in via PLAY doesn\u2019t work\n  - DNA-96594 Unnecessary extra space in fullscreen mode on M1 Pro MacBooks\n  - DNA-96649 Update Meme button\n  - DNA-96676 Add Icon in the Sidebar Setup\n  - DNA-96677 Add default URL\n- The update to chromium 96.0.4664.93 fixes following issues:\n  CVE-2021-4052, CVE-2021-4053, CVE-2021-4079, CVE-2021-4054,\n  CVE-2021-4078, CVE-2021-4055, CVE-2021-4056, CVE-2021-4057,\n  CVE-2021-4058, CVE-2021-4059, CVE-2021-4061, CVE-2021-4062,\n  CVE-2021-4063, CVE-2021-4064, CVE-2021-4065, CVE-2021-4066,\n  CVE-2021-4067, CVE-2021-4068\n\n- Update to version 82.0.4227.23\n  - DNA-95632 With new au-logic UUID is set with delay and may be\n    not set for pb-builds (when closing fast)\n  - DNA-96349 Laggy tooltip animation\n  - DNA-96483 [Snap][Linux] Video not working / wrong ffmpeg snap\n    version for Opera 82\n  - DNA-96493 Create \u0027small\u0027 enticement in credit card autofill\n  - DNA-96533 Opera 82 translations\n  - DNA-96535 Make the URL configurable\n  - DNA-96553 Add switch to whitelist test pages\n  - DNA-96557 Links not opened from panel\n  - DNA-96558 AdBlock bloks some trackers inside the panel\n  - DNA-96568 [Player] Tidal in sidebar Player opens wrong site\n    when logging in\n  - DNA-96659 Siteprefs not applied after network service crash\n  - DNA-96593 Promote O82 to stable\n- Complete Opera 82.0 changelog at:\n  https://blogs.opera.com/desktop/changelog-for-82/\n- Update to version 82.0.4227.13\n  - CHR-8668 Update chromium on desktop-stable-96-4227 to\n    96.0.4664.45\n  - DNA-76987 [Mac] Update desktop EULA with geolocation split\n  - DNA-93388 Problem with symlinks on windows when creating\n    file list\n  - DNA-95734 Discarded Recently Closed items get revived\n    after restart\n  - DNA-96134 \u0027Your profile has been updated\u0027 does not disappear\n  - DNA-96190 Opera freezes when trying to drag expanded\n    bookmark folder with nested subfolders\n  - DNA-96223 Easy Files not working in Full Screen\n  - DNA-96274 Checkout autofill shouldn\u0027t show used burner card\n  - DNA-96275 Change the notification message for pausing\n    multi-use cards\n  - DNA-96295 \u0027Video pop out\u0027 setting doesn\u0027t sync\n  - DNA-96316 Highlight text wrong colour on dark mode\n  - DNA-96326 Wrong translation Private Mode \u003e Turkish\n  - DNA-96351 macOS window controls are missing in full screen\n  - DNA-96440 Update video URL\n  - DNA-96448 add option to pin extension via rich hints\n  - DNA-96453 Register user-chosen option on client-side, read on\n    hint side\n  - DNA-96454 Choosing an option from the settings menu should\n    close the popup\n  - DNA-96484 Enable AB test for a new autoupdater logic (for 50%)\n  - DNA-96500 Add \u0027don\u0027t show me again\u0027 prefs to allowed whitelist\n  - DNA-96538 Inline audiocomplete for www.mediaexpert.pl\n    incorrectly suggested\n- The update to chromium 96.0.4664.45 fixes following issues:\n  CVE-2021-38005, CVE-2021-38006, CVE-2021-38007, CVE-2021-38008,\n  CVE-2021-38009, CVE-2021-38010, CVE-2021-38011, CVE-2021-38012,\n  CVE-2021-38013, CVE-2021-38014, CVE-2021-38015, CVE-2021-38016,\n  CVE-2021-38017, CVE-2021-38019, CVE-2021-38020, CVE-2021-38021,\n  CVE-2021-38022\n \n\n- Update to version 81.0.4196.54\n  - CHR-8644 Update chromium on desktop-stable-95-4196 to\n    95.0.4638.69\n  - DNA-95773 ExtensionWebRequestApiTest crashes on mac\n  - DNA-96062 Opera 81 translations\n  - DNA-96134 \u201cYour profile has been updated\u2019 does not disappear\n  - DNA-96274 Checkout autofill shouldn\u2019t show used burner card\n  - DNA-96275 Change the notification message for pausing\n    multi-use cards\n  - DNA-96440 Update video URL\n- The update to chromium 95.0.4638.69 fixes following issues:\n  CVE-2021-37997, CVE-2021-37998, CVE-2021-37999, CVE-2021-37980,\n  CVE-2021-38001, CVE-2021-38002, CVE-2021-38003, CVE-2021-38004 \n- Update to version 81.0.4196.37\n  - DNA-96008 Crash at\n    content::WebContentsImpl::OpenURL(content::OpenURLParams const\u0026)\n  - DNA-96032 Closing the videoconference pop-up force leaving\n    the meeting\n  - DNA-96092 Crash at void\n    opera::ModalDialogViews::OnWidgetClosing(opera::ModalDialog::Result)\n  - DNA-96142 [Yat] Emoji icon cut off in URL for Yat\n\n- Update to version 81.0.4196.31\n  - DNA-95733 Implement the \u201cManage\u201d menu in card details view\n  - DNA-95736 Update UI for paused card\n  - DNA-95791 Crash at base::operator\u003c\n  - DNA-95794 Sometimes the sidebar UI fails to load\n  - DNA-95812 Retrieve cards info when showing autofill\n  - DNA-96035 Cannot create virtual card on Sandbox environment\n  - DNA-96147 \u201cBuy\u201d button does not work\n  - DNA-96168 Update contributors list\n  - DNA-96211 Enable #fast-tab-tooltip on all streams\n  - DNA-96231 Promote O81 to stable\n- Complete Opera 80.1 changelog at:\n  https://blogs.opera.com/desktop/changelog-for-81/\n- Update to version 81.0.4196.27\n  - CHR-8623 Update chromium on desktop-stable-95-4196 to\n    95.0.4638.54\n  - DNA-92384 Better segmenting of hint users\n  - DNA-95523 Allow sorting in multi-card view\n  - DNA-95659 Flow of Lastcard on first login\n  - DNA-95735 Implement the button that reveals full card\n    details\n  - DNA-95747 Better way to handle expired funding card\n  - DNA-95949 [Mac Retina] Clicking active tab should scroll\n    to the top\n  - DNA-95993 Update icon used for Yat in address bar dropdown\n  - DNA-96021 Cleared download item view is never deleted\n  - DNA-96036 Occupation field in \u0027Account \u2013 Edit\u0027 is shown\n    twice\n  - DNA-96127 Upgrade plan button does nothing\n  - DNA-96138 \u0027Add Card\u0027 button does not change to\n    \u0027Upgrade Plan\u0027 after adding card\n- The update to chromium 95.0.4638.54 fixes following issues:\n  CVE-2021-37981, CVE-2021-37982, CVE-2021-37983, CVE-2021-37984,\n  CVE-2021-37985, CVE-2021-37986, CVE-2021-37987, CVE-2021-37988,\n  CVE-2021-37989, CVE-2021-37990, CVE-2021-37991, CVE-2021-37992,\n  CVE-2021-37993, CVE-2021-37994, CVE-2021-37995, CVE-2021-37996\n\n- Update to version 80.0.4170.72\n  - DNA-95522 Change card view to show all types of cards\n  - DNA-95523 Allow sorting in multi-card view\n  - DNA-95524 Allow searching for cards by name\n  - DNA-95658 Allow user to add a card\n  - DNA-95659 Flow of Lastcard on first login\n  - DNA-95660 Implement editing card details\n  - DNA-95699 Add card details view\n  - DNA-95733 Implement the \u201cManage\u201d menu in card details view\n  - DNA-95735 Implement the button that reveals full card details\n  - DNA-95736 Update UI for paused card\n  - DNA-95747 Better way to handle expired funding card\n  - DNA-95794 Sometimes the sidebar UI fails to load\n  - DNA-95812 Retrieve cards info when showing autofill\n  - DNA-96036 Occupation field in \u2018Account \u2013 Edit\u2019 is shown twice\n  - DNA-96127 Upgrade plan button does nothing\n  - DNA-96138 \u201cAdd Card\u201d button does not change to \u201cUpgrade Plan\u201d\n    after adding card\n\n- Update to version 80.0.4170.63\n  - CHR-8612 Update chromium on desktop-stable-94-4170 to\n    94.0.4606.81\n  - DNA-95434 Crash at opera::ThemesService::UpdateCurrentTheme()\n- The update to chromium 94.0.4606.81 fixes following issues:\n  CVE-2021-37977, CVE-2021-37978, CVE-2021-37979, CVE-2021-37980\n\n- Update to version 80.0.4170.40\n  - CHR-8598 Update chromium on desktop-stable-94-4170 to\n    94.0.4606.71\n  - DNA-95221 Emoji button stuck in address bar\n  - DNA-95325 Make y.at navigations to be reported with\n    page_views events\n  - DNA-95327 Add \u201cEmojis\u201d context menu option in address\n    bar field\n  - DNA-95339 Add YAT emoji url suggestion to search\u00a9 dialog\n  - DNA-95416 Remove emoji button from address bar\n  - DNA-95439 Enable #yat-emoji-addresses on developer stream\n  - DNA-95441 [Mac big sur] Emoji are not shown in address\n    bar url\n  - DNA-95514 Crash at resource_coordinator::TabLifecycleUnitSource\n    ::TabLifecycleUnit::OnLifecycleUnitStateChanged(mojom::\n    LifecycleUnitState, mojom::LifecycleUnitStateChangeReason)\n  - DNA-95746 Enable #reader-mode everywhere\n  - DNA-95865 Numbers are recognized as emojis\n  - DNA-95866 Change Yat text in selection popup\n  - DNA-95867 Show that buttons are clickable in selection popup\n- The update to chromium 94.0.4606.71 fixes following issues: \n  CVE-2021-37974, CVE-2021-37975, CVE-2021-37976\n\n- Update to version 80.0.4170.16\n  - CHR-8590 Update chromium on desktop-stable-94-4170\n    to 94.0.4606.61\n  - DNA-95347 Make InstallerStep::Run async\n  - DNA-95420 First suggestion in address field is often not\n    highlighted\n  - DNA-95613 Browser closing itself after closing SD/first tab\n    and last opened tab\n  - DNA-95725 Promote O80 to stable\n  - DNA-95781 Import fixes for CVE-2021-37975, CVE-2021-37976 and\n    CVE-2021-37974 to desktop-stable-94-4170\n- Complete Opera 80.0 changelog at:\n  https://blogs.opera.com/desktop/changelog-for-80/\n- Drop Provides/Obsoletes for opera-gtk and opera-kde4\n  opera-gtk and opera-kde4 were last used in openSUSE 13.1\n- Drop post/postun for desktop_database_post and\n  icon_theme_cache_post because were last used before\n  openSUSE 15.0\n\n- Update to version 79.0.4143.72\n  - DNA-94933 Add emoji panel to address bar\n  - DNA-95210 Add emoji YAT address bar suggestions\n  - DNA-95221 Emoji button stuck in address bar\n  - DNA-95325 Make y.at navigations to be reported with page_views\n    events\n  - DNA-95327 Add \u201cEmojis\u201d context menu option in address bar field\n  - DNA-95339 Add YAT emoji url suggestion to search\u00a9 dialog\n  - DNA-95364 Add browser feature flag\n  - DNA-95416 Remove emoji button from address bar\n  - DNA-95439 Enable #yat-emoji-addresses on developer stream\n  - DNA-95441 [Mac big sur] Emoji are not shown in address bar url\n  - DNA-95445 Crash when removing unsynced pinboard bookmark with\n    sync enabled\n  - DNA-95512 Allow to show title and timer for simple banners\n  - DNA-95516 Wrong label in settings for themes\n  - DNA-95679 Temporarily disable AB test for a new autoupdater\n    logic\n\n- Update to version 79.0.4143.50\n  - CHR-8571 Update chromium on desktop-stable-93-4143\n    to 93.0.4577.82\n  - DNA-94104 ContinueShoppingOnEbayBrowserTest.ShouldDisplayOffers\n    TilesStartingWithMostActiveOnes fails\n  - DNA-94894 [Rich Hint] Agent API permissions\n  - DNA-94989 Wrong color and appearance of subpages in the settings\n  - DNA-95241 \u201cSwitch to tab\u201d button is visible only on hover\n  - DNA-95286 Add unit tests to pinboard sync related logic in browser\n  - DNA-95372 [Mac retina screen] Snapshot doesnt capture cropped area\n  - DNA-95526 Some webstore extensions are not verified properly\n- The update to chromium 93.0.4577.82 fixes following issues:\n  CVE-2021-30625, CVE-2021-30626, CVE-2021-30627, CVE-2021-30628,\n  CVE-2021-30629, CVE-2021-30630, CVE-2021-30631, CVE-2021-30632,\n  CVE-2021-30633\n\n- Update to version 79.0.4143.22\n  - CHR-8550 Update chromium on desktop-stable-93-4143 to\n    93.0.4577.58\n  - CHR-8557 Update chromium on desktop-stable-93-4143 to\n    93.0.4577.63\n  - DNA-94641 [Linux] Proprietary media codecs not working in\n    snap builds\n  - DNA-95076 [Linux] Page crash with media content\n  - DNA-95084 [Mac] Cannot quit through menu with snapshot\n    editor open\n  - DNA-95138 Add setting to synchronize Pinboards\n  - DNA-95157 Crash at -[OperaCrApplication sendEvent:]\n  - DNA-95204 Opera 79 translations\n  - DNA-95240 The pinboard thumbnail cannot be generated anymore\n  - DNA-95278 Existing Pinboards might be missing\n  - DNA-95292 Enable #bookmarks-trash-cleaner on all streams\n  - DNA-95293 Enable #easy-files-downloads-folder on all streams\n  - DNA-95383 Promote O79 to stable\n- Complete Opera 79.0 changelog at:\n  https://blogs.opera.com/desktop/changelog-for-79/ \n- The update to chromium 93.0.4577.58 fixes following issues:\n  CVE-2021-30606, CVE-2021-30607, CVE-2021-30608, CVE-2021-30609,\n  CVE-2021-30610, CVE-2021-30611, CVE-2021-30612, CVE-2021-30613,\n  CVE-2021-30614, CVE-2021-30615, CVE-2021-30616, CVE-2021-30617,\n  CVE-2021-30618, CVE-2021-30619, CVE-2021-30620, CVE-2021-30621,\n  CVE-2021-30622, CVE-2021-30623, CVE-2021-30624\n\n- Update to version 78.0.4093.184\n  - CHR-8533 Update chromium on desktop-stable-92-4093 to\n    92.0.4515.159\n  - DNA-93472 Reattaching to other browsers\n  - DNA-93741 Multiple hint slots\n  - DNA-93742 Allow displaying unobtrusive external hints\n  - DNA-93744 Add slots in toolbar action view\n  - DNA-94230 Improve text contrast for Speed Dials\n  - DNA-94724 [Mac] Add macOS dark theme wallpaper with easy setup\n  - DNA-94786 Crash at base::SupportsUserData::\n    SetUserData(void const*, std::__1::unique_ptr)\n  - DNA-94807 Allow scripts access opera version and product info\n  - DNA-94862 Continue on shopping Amazon doesn\u2019t work correct\n  - DNA-94870 Add an addonsPrivate function to install with\n    permissions dialog first\n  - DNA-95064 Revert DNA-93714 on stable\n- The update to chromium 92.0.4515.159 fixes following issues: \n  CVE-2021-30598, CVE-2021-30599, CVE-2021-30600, CVE-2021-30601,\n  CVE-2021-30602, CVE-2021-30603, CVE-2021-30604\n  \n\n- Update to version 78.0.4093.147\n  - CHR-8251 Update chromium on desktop-stable-92-4093\n    to 92.0.4515.131\n  - DNA-93036 Opera not starting after closing window.\n    Processes still working.\n  - DNA-94516 Add \u2018Detach tab\u2019 entry to tab menu\n  - DNA-94584 [Mac] Sidebar setup not closed after press\n    \u2018Add extensions\u2019 button\n  - DNA-94761 Crash when trying to record \u201cChrome developer\u201d trace\n  - DNA-94790 Crash at opera::VideoConferenceTabDetachController::\n    OnBrowserAboutToStartClosing(Browser*)\n- The update to chromium 92.0.4515.131 fixes following issues:\n  CVE-2021-30590, CVE-2021-30591, CVE-2021-30592, CVE-2021-30593,\n  CVE-2021-30594, CVE-2021-30596, CVE-2021-30597\n\n- Update to version 78.0.4093.112\n  - DNA-94466 Implement sorting Pinboards in overview\n  - DNA-94582 Add access to APIs for showing pinboard icon in\n    sidebar\n  - DNA-94603 Suspicious pinboards events\n  - DNA-94625 Disable opr.pinboardPrivate.getThumbnail() for\n    local files\n  - DNA-94640 Promote O78 to stable\n  - DNA-94661 Missing translations for some languages\n- Complete Opera 78.0 changelog at:\n  https://blogs.opera.com/desktop/changelog-for-78/  \n\n- Update to version 77.0.4054.277\n  - CHR-8502 Update chromium on desktop-stable-91-4054 to\n    91.0.4472.164\n  - DNA-94291 Video conference popout doesnt remember its size\n    after resizing\n  - DNA-94399 Incorrect icon for wp.pl in address bar dropdown\n  - DNA-94462 Low quality of default wallpaper on windows\n- The update to chromium 91.0.4472.164 fixes following issues:\n  CVE-2021-30541, CVE-2021-30560, CVE-2021-30561, CVE-2021-30562,\n  CVE-2021-30563, CVE-2021-30564\n\n- Update to version 77.0.4054.254\n  - DNA-92344 Windows 10 Implementation\n  - DNA-92486 Replace \u24e7 icon with \u201csettings\u201d icon\n  - DNA-92487 Close individual item\n  - DNA-92496 Create separate entry in settings for BABE\n  - DNA-93275 Implement cycles size according to design\n  - DNA-93280 The system theme has only half a checkmark\n  - DNA-93728 Whatsapp notification is not refreshed\n  - DNA-94047 Remove pinboard WebUI integration\n  - DNA-94118 Write test for ThumbnailTabHelper changes in DNA-94100\n  - DNA-94120 Fix Welcome popup layout\n  - DNA-94140 Crash at base::TaskRunner\n    ::PostTask(base::Location const\u0026, base::OnceCallback)\n  - DNA-94205 Consider setting pinboard display URL in\n    address_field_helper.cc\n  - DNA-94211 Easy Files don\u2019t show thumbnails\n  - DNA-94309 Pinboards URLs don\u2019t get lighter color treatment\n  - DNA-94318 Wrong \u2018Transparency\u2019 word translation in Swedish\n  - DNA-94321 AB test: google suggestions on top \u2013 bigger test\n  - DNA-94341 Make pinboard popup testable on web page\n  - DNA-94381 Disabling Pinboards doesn\u2019t remove item from\n    menu / sidebar\n  - DNA-94392 Add u2f-devices interface to snap packages\n  - DNA-94461 Enable #system-theme on all streams\n\n- Update to version 77.0.4054.203\n  - CHR-8475 Update chromium on desktop-stable-91-4054 to\n    91.0.4472.124\n  - DNA-93523 Crash at extensions::TabHelper::WebContentsDestroyed()\n  - DNA-93917 Upload snap to edge while preparing repository package\n  - DNA-94157 Crash at gfx::ICCProfile::operator=(gfx::ICCProfile const\u0026)\n  - DNA-94159 Crash at opera::auth::AuthAccountServiceImpl::GetAuthAccount()\n  - DNA-94161 [Add tabs]Unexpected symbols instead of Workspace name\n  - DNA-94241 Implement better process killing for timeout\n  - DNA-94248 Allow retry on tests that timed-out\n  - DNA-94251 heap-use-after-free in VideoConference\n  - DNA-94315 Crash at class std::__1::basic_string ui::ResourceBundle::\n    LoadLocaleResources(const class std::__1::basic_string\u0026 const, bool)\n  - DNA-94357 Fix issue in scripts\n\n- Update to version 77.0.4054.172\n  - DNA-93078 Do not display \u2018share tab\u2019 sliding toolbar on\n    detached tab\n  - DNA-93358 The red underline extends beyond the Google meets\n    conference tab outline\n  - DNA-93404 Crash in test when destroying BABE\u2019s webcontents\n  - DNA-93637 ctrl+9 shortcut is inconsistent with other browsers\n  - DNA-93661 Add opauto test to cover new shortcut from DNA-93637\n  - DNA-93867 Use version from package instead of repository\n  - DNA-93993 Pinboard translations from Master\n  - DNA-94099 Increase new-autoupdater-logic AB test to cover\n    50% of new installations\n  - DNA-94100 Thumbnail doesn\u2019t update\n  - DNA-94178 Automatic popout should not happen after manually\n    closing a popout\n\n- Update to version 77.0.4054.146\n  - CHR-8458 Update chromium on desktop-stable-91-4054 to\n    91.0.4472.114\n  - DNA-92171 Create active linkdiscovery service\n  - DNA-92388 Fix and unskip \n    WorkspacesEmoji.testChooseEmojiAsWorkspaceIcon when possible\n  - DNA-93101 Tabs are being snoozed when tab snoozing is disabled\n  - DNA-93386 Update pinboard view when item changes\n  - DNA-93448 Make browser ready for Developer release\n  - DNA-93491 Fix failing tests after enabling #pinboard flag\n  - DNA-93498 Add additional music services\n  - DNA-93503 Blank popup on clicking toolbar icon with popup open\n  - DNA-93561 Do not allow zoom different from 100% in Pinboard popup\n  - DNA-93637 ctrl+9 shortcut is inconsistent with other browsers\n  - DNA-93644 Create route for `import open tabs` to `pinboard`\n  - DNA-93664 Adapt popup to design\n  - DNA-93702 Turn on flags on developer\n  - DNA-93737 [Pinboard] Remove Mock API\n  - DNA-93745 Unable to open the popup after opening it several times\n  - DNA-93776 Popup closes and reopens when clicking the toolbar button\n  - DNA-93786 DCHECK after opening popup\n  - DNA-93802 Crash at views::Widget::GetNativeView() const\n  - DNA-93810 Add pinboard icon to sidebar\n  - DNA-93825 Add pinboard to Opera menu\n  - DNA-93833 [Player] Implement seeking for new services\n  - DNA-93845 Do not log output of snapcraft on console\n  - DNA-93864 Create feature flag for start page sync banner\n  - DNA-93865 Implement start page banner\n  - DNA-93867 Use version from package instead of repository\n  - DNA-93878 [Player] Crash when current player service becomes\n    unavailable when user location changes\n  - DNA-93953 \u2018Send image to Pinboard\u2019 has the wrong position\n    in the context menu\n  - DNA-93987 Disable zooming popup contents like in other popups\n  - DNA-93989 Change internal URL to opera://pinboards\n  - DNA-93990 Update strings to reflect new standards\n  - DNA-93992 Add Pinboards to Opera settings\n  - DNA-93993 Pinboard translations from Master\n  - DNA-94011 Enable feature flags for Reborn 5 on stable\n  - DNA-94019 Add a direct link to settings\n  - DNA-94088 Internal pages provoke not saving other pages to\n    the Pinboard\n  - DNA-94111 [O77] Sidebar setup does not open\n  - DNA-94139 Crash at \n    opera::(anonymous namespace)::PinboardPopupWebView::RemovedFromWidget()\n- The update to chromium 91.0.4472.114 fixes following issues:\n  CVE-2021-30554, CVE-2021-30555, CVE-2021-30556, CVE-2021-30557\n\n- Update to version 77.0.4054.90\n  - CHR-8446 Update chromium on desktop-stable-91-4054 to\n    91.0.4472.101\n- The update to chromium 91.0.4472.101 fixes following issues:     \n  CVE-2021-30544, CVE-2021-30545, CVE-2021-30546, CVE-2021-30547, \n  CVE-2021-30548, CVE-2021-30549, CVE-2021-30550, CVE-2021-30551,\n  CVE-2021-30552, CVE-2021-30553\n- Update to version 77.0.4054.80\n  - DNA-93656 Active cards in checkout Auto-fill\n  - DNA-93805 Create snap packages in buildsign\n  - DNA-93823 archive_opera_snap failures on Linux\n  - DNA-93844 Fix AttributeError in package_type.py\n  \n\n- Update to version 77.0.4054.64\n  - DNA-93159 Implement image(preview) of each created pinboard\n  - DNA-93273 \u2018Send image to Pinboard\u2019 doesn\u2019t work correct on\n    staging server\n  - DNA-93277 Add/update opauto tests for the System Theme WP1\n    implementation p.1\n  - DNA-93286 [BigSur] YT not being reloaded when opened from link\n  - DNA-93296 Opera 77 translations\n  - DNA-93372 Build new edition for Axel Springer\n  - DNA-93376 Write unittests for PinboardImageCollector\n  - DNA-93401 [LastCard] Do not change user state if not needed\n  - DNA-93409 Animation with hat and glasses is missing in\n    Private mode\n  - DNA-93443 API opr.pinboardPrivate.getThumbnail() returns\n    old thumbnail image\n  - DNA-93509 Add Opera switch for pinboard staging backend\n    and use it for tests\n  - DNA-93519 [Sidebar] WhatsApp \u2018Log out\u2019 doesn\u2019t work\n  - DNA-93634 Fix errors in Slovak translations\n  - DNA-93724 Some webstore extensions are not verified properly\n- Complete Opera 77.0 changelog at:\n  https://blogs.opera.com/desktop/changelog-for-77/\n\n- Update to version 76.0.4017.177\n  - DNA-92597 Sound controller doesn\u2019t work after pressing\n    \u2018Next\u2019 button\n  - DNA-93405 Import vmp_signer instead of starting new python\n    process\n  - DNA-93406 [Mac] Import plist_util instead of calling script\n    in _generateAppEntitlements\n  - DNA-93442 Make GX Control panel attachable by webdriver\n  - DNA-93554 [AdBlock] Find a fix for blocking \u2018new\u2019 YouTube ads\n  - DNA-93587 Pre-refactor solution\n\n- Update to version 76.0.4017.154\n  - CHR-8420 Update chromium on desktop-stable-90-4017 to\n    90.0.4430.212\n  - DNA-92411 Bookmarks breadcrumbs wrong color when pressed in\n    dark mode\n  - DNA-92587 Sync settings: \u201cUse old password\u201d button doesn\u2019t work\n  - DNA-92672 Make it possible for agent to inject scripts into\n    startpage\n  - DNA-92712 Add SD reload API\n  - DNA-93190 The bookmark can\u2019t be opened in Workspace 5-6\n  - DNA-93247 Reopen last closed tab shortcut opens random tab on\n    new window\n  - DNA-93294 Binary diff for opera_browser.dll is not created on\n    32-bit builds\n  - DNA-93313 Add opauto test to cover DNA-93190\n  - DNA-93368 Fix an error in Polish translation\n  - DNA-93408 [Windows] widevine_cdm_component_installer does not\n    compile on desktop-stable-90-4017\n- The update to chromium 90.0.4430.212 fixes following issues:    \n  CVE-2021-30506, CVE-2021-30507, CVE-2021-30508, CVE-2021-30509,\n  CVE-2021-30510, CVE-2021-30511, CVE-2021-30512, CVE-2021-30513,\n  CVE-2021-30514, CVE-2021-30515, CVE-2021-30516, CVE-2021-30517,\n  CVE-2021-30518, CVE-2021-30519, CVE-2021-30520\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2022-110",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0110-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2022:0110-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2022:0110-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30506 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30506/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30507 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30507/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30508 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30508/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30509 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30509/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30510 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30510/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30511 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30511/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30512 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30512/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30513 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30513/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30514 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30514/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30515 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30515/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30516 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30516/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30517 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30517/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30518 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30518/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30519 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30519/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30520 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30520/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30541 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30541/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30544 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30544/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30545 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30545/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30546 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30546/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30547 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30547/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30548 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30548/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30549 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30549/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30550 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30550/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30551 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30551/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30552 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30552/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30553 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30553/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30554 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30554/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30555 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30555/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30556 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30556/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30557 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30557/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30560 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30560/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30561 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30561/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30562 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30562/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30563 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30563/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30564 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30564/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30590 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30590/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30591 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30591/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30592 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30592/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30593 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30593/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30594 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30594/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30596 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30596/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30597 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30597/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30598 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30598/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30599 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30599/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30600 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30600/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30601 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30601/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30602 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30602/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30603 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30603/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30604 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30604/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30606 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30606/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30607 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30607/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30608 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30608/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30609 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30610 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30610/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30611 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30611/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30612 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30612/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30613 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30613/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30614 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30614/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30615 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30616 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30616/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30617 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30617/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30618 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30618/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30619 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30619/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30620 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30620/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30621 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30621/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30622 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30622/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30623 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30623/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30624 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30624/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30625 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30625/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30626 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30626/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30627 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30627/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30628 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30628/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30629 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30629/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30630 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30630/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30631 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30631/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30632 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30632/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-30633 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-30633/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37974 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37974/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37975 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37975/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37976 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37976/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37977 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37978 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37978/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37979 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37979/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37980 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37980/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37981 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37982 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37982/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37983 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37983/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37984 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37984/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37985 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37985/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37986 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37986/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37987 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37987/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37988 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37988/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37989 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37989/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37990 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37990/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37991 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37991/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37992 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37992/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37993 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37993/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37994 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37994/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37995 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37995/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37996 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37996/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37997 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37997/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37998 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37998/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37999 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37999/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38001 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38001/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38002 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38002/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38003 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38003/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38004 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38004/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38005 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38005/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38006 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38006/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38007 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38007/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38008 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38009 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38009/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38010 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38010/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38011 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38011/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38012 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38012/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38013 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38013/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38014 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38014/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38015 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38015/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38016 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38016/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38017 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38017/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38019 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38019/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38020 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38020/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38021 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38021/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38022 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38022/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4052 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4052/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4053 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4054 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4055 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4055/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4056 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4056/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4057 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4057/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4058 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4058/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4059 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4059/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4061 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4061/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4062 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4062/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4063 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4063/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4064 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4064/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4065 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4065/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4066 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4067 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4067/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4068 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4078 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4078/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4079 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4079/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4098 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4098/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4099 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4100 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4100/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4101 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4101/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4102 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4102/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0096 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0097 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0097/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0098 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0098/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0099 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0100 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0100/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0101 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0101/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0102 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0102/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0103 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0103/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0104 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0104/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0105 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0105/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0106 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0106/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0107 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0107/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0108 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0108/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0109 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0109/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0110 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0110/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0111 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0111/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0112 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0112/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0113 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0113/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0114 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0114/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0115 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0115/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0116 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0116/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0117 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0117/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0118 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0118/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0120 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0120/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0289 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0289/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0290 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0290/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0291 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0291/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0292 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0292/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0293 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0293/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0294 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0294/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0295 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0295/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0296 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0296/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0297 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0297/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0298 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0298/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0300 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0300/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0301 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0301/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0302 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0302/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0304 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0304/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0305 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0305/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0306 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0306/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0307 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0307/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0308 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0308/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0309 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0309/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0310 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0310/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0311 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0311/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0452 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0452/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0453 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0453/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0454 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0454/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0455 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0455/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0456 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0456/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0457 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0457/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0458 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0459 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0459/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0460 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0460/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0461 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0461/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0462 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0462/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0463 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0463/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0464 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0464/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0465 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0465/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0466 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0466/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0467 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0467/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0468 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0468/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0469 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0469/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0470 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0470/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0603 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0603/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0604 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0604/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0605 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0605/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0606 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0606/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0607 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0607/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0608 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0608/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0609 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0610 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0610/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0789 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0789/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0790 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0790/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0791 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0791/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0792 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0792/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0793 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0793/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0794 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0794/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0795 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0795/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0796 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0796/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0797 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0797/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0798 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0799 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0799/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0800 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0800/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0801 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0801/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0802 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0802/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0803 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0803/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0804 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0804/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0805 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0805/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0806 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0806/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0807 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0807/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0808 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0809 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0809/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1096 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1096/"
      }
    ],
    "title": "Security update for opera",
    "tracking": {
      "current_release_date": "2022-04-08T14:01:17Z",
      "generator": {
        "date": "2022-04-08T14:01:17Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2022:0110-1",
      "initial_release_date": "2022-04-08T14:01:17Z",
      "revision_history": [
        {
          "date": "2022-04-08T14:01:17Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "opera-85.0.4341.28-lp154.2.5.1.x86_64",
                "product": {
                  "name": "opera-85.0.4341.28-lp154.2.5.1.x86_64",
                  "product_id": "opera-85.0.4341.28-lp154.2.5.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.4 NonFree",
                "product": {
                  "name": "openSUSE Leap 15.4 NonFree",
                  "product_id": "openSUSE Leap 15.4 NonFree",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "opera-85.0.4341.28-lp154.2.5.1.x86_64 as component of openSUSE Leap 15.4 NonFree",
          "product_id": "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        },
        "product_reference": "opera-85.0.4341.28-lp154.2.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4 NonFree"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-30506",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30506"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect security UI in Web App Installs in Google Chrome on Android prior to 90.0.4430.212 allowed an attacker who convinced a user to install a web application to inject scripts or HTML into a privileged page via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30506",
          "url": "https://www.suse.com/security/cve/CVE-2021-30506"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30506",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30506"
    },
    {
      "cve": "CVE-2021-30507",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30507"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Offline in Google Chrome on Android prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30507",
          "url": "https://www.suse.com/security/cve/CVE-2021-30507"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30507",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30507"
    },
    {
      "cve": "CVE-2021-30508",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30508"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Media Feeds in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to enable certain features in Chrome to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30508",
          "url": "https://www.suse.com/security/cve/CVE-2021-30508"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30508",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30508"
    },
    {
      "cve": "CVE-2021-30509",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30509"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds write in Tab Strip in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page and a crafted Chrome extension.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30509",
          "url": "https://www.suse.com/security/cve/CVE-2021-30509"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30509",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30509"
    },
    {
      "cve": "CVE-2021-30510",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30510"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Aura in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30510",
          "url": "https://www.suse.com/security/cve/CVE-2021-30510"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30510",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30510"
    },
    {
      "cve": "CVE-2021-30511",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30511"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds read in Tab Groups in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30511",
          "url": "https://www.suse.com/security/cve/CVE-2021-30511"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30511",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30511"
    },
    {
      "cve": "CVE-2021-30512",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30512"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Notifications in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30512",
          "url": "https://www.suse.com/security/cve/CVE-2021-30512"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30512",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30512"
    },
    {
      "cve": "CVE-2021-30513",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30513"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30513",
          "url": "https://www.suse.com/security/cve/CVE-2021-30513"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30513",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30513"
    },
    {
      "cve": "CVE-2021-30514",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30514"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Autofill in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30514",
          "url": "https://www.suse.com/security/cve/CVE-2021-30514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30514",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30514"
    },
    {
      "cve": "CVE-2021-30515",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30515"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in File API in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30515",
          "url": "https://www.suse.com/security/cve/CVE-2021-30515"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30515",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30515"
    },
    {
      "cve": "CVE-2021-30516",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30516"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in History in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30516",
          "url": "https://www.suse.com/security/cve/CVE-2021-30516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30516",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30516"
    },
    {
      "cve": "CVE-2021-30517",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30517"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30517",
          "url": "https://www.suse.com/security/cve/CVE-2021-30517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30517",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30517"
    },
    {
      "cve": "CVE-2021-30518",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30518"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Reader Mode in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30518",
          "url": "https://www.suse.com/security/cve/CVE-2021-30518"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30518",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30518"
    },
    {
      "cve": "CVE-2021-30519",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30519"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Payments in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious payments app to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30519",
          "url": "https://www.suse.com/security/cve/CVE-2021-30519"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30519",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30519"
    },
    {
      "cve": "CVE-2021-30520",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30520"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Tab Strip in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30520",
          "url": "https://www.suse.com/security/cve/CVE-2021-30520"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185908 for CVE-2021-30520",
          "url": "https://bugzilla.suse.com/1185908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30520"
    },
    {
      "cve": "CVE-2021-30541",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30541"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30541",
          "url": "https://www.suse.com/security/cve/CVE-2021-30541"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188373 for CVE-2021-30541",
          "url": "https://bugzilla.suse.com/1188373"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30541"
    },
    {
      "cve": "CVE-2021-30544",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30544"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in BFCache in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30544",
          "url": "https://www.suse.com/security/cve/CVE-2021-30544"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187141 for CVE-2021-30544",
          "url": "https://bugzilla.suse.com/1187141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30544"
    },
    {
      "cve": "CVE-2021-30545",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30545"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Extensions in Google Chrome prior to 91.0.4472.101 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30545",
          "url": "https://www.suse.com/security/cve/CVE-2021-30545"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187141 for CVE-2021-30545",
          "url": "https://bugzilla.suse.com/1187141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30545"
    },
    {
      "cve": "CVE-2021-30546",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30546"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Autofill in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30546",
          "url": "https://www.suse.com/security/cve/CVE-2021-30546"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187141 for CVE-2021-30546",
          "url": "https://bugzilla.suse.com/1187141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30546"
    },
    {
      "cve": "CVE-2021-30547",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30547"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30547",
          "url": "https://www.suse.com/security/cve/CVE-2021-30547"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187141 for CVE-2021-30547",
          "url": "https://bugzilla.suse.com/1187141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188275 for CVE-2021-30547",
          "url": "https://bugzilla.suse.com/1188275"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30547"
    },
    {
      "cve": "CVE-2021-30548",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30548"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Loader in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30548",
          "url": "https://www.suse.com/security/cve/CVE-2021-30548"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187141 for CVE-2021-30548",
          "url": "https://bugzilla.suse.com/1187141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30548"
    },
    {
      "cve": "CVE-2021-30549",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30549"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Spell check in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30549",
          "url": "https://www.suse.com/security/cve/CVE-2021-30549"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187141 for CVE-2021-30549",
          "url": "https://bugzilla.suse.com/1187141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30549"
    },
    {
      "cve": "CVE-2021-30550",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30550"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Accessibility in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30550",
          "url": "https://www.suse.com/security/cve/CVE-2021-30550"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187141 for CVE-2021-30550",
          "url": "https://bugzilla.suse.com/1187141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30550"
    },
    {
      "cve": "CVE-2021-30551",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30551"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30551",
          "url": "https://www.suse.com/security/cve/CVE-2021-30551"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187141 for CVE-2021-30551",
          "url": "https://bugzilla.suse.com/1187141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30551"
    },
    {
      "cve": "CVE-2021-30552",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30552"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Extensions in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30552",
          "url": "https://www.suse.com/security/cve/CVE-2021-30552"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187141 for CVE-2021-30552",
          "url": "https://bugzilla.suse.com/1187141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30552"
    },
    {
      "cve": "CVE-2021-30553",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30553"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Network service in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30553",
          "url": "https://www.suse.com/security/cve/CVE-2021-30553"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187141 for CVE-2021-30553",
          "url": "https://bugzilla.suse.com/1187141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30553"
    },
    {
      "cve": "CVE-2021-30554",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30554"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30554",
          "url": "https://www.suse.com/security/cve/CVE-2021-30554"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187481 for CVE-2021-30554",
          "url": "https://bugzilla.suse.com/1187481"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30554"
    },
    {
      "cve": "CVE-2021-30555",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30555"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Sharing in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and user gesture.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30555",
          "url": "https://www.suse.com/security/cve/CVE-2021-30555"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187481 for CVE-2021-30555",
          "url": "https://bugzilla.suse.com/1187481"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30555"
    },
    {
      "cve": "CVE-2021-30556",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30556"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in WebAudio in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30556",
          "url": "https://www.suse.com/security/cve/CVE-2021-30556"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187481 for CVE-2021-30556",
          "url": "https://bugzilla.suse.com/1187481"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30556"
    },
    {
      "cve": "CVE-2021-30557",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30557"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in TabGroups in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30557",
          "url": "https://www.suse.com/security/cve/CVE-2021-30557"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187481 for CVE-2021-30557",
          "url": "https://bugzilla.suse.com/1187481"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30557"
    },
    {
      "cve": "CVE-2021-30560",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30560"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30560",
          "url": "https://www.suse.com/security/cve/CVE-2021-30560"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188373 for CVE-2021-30560",
          "url": "https://bugzilla.suse.com/1188373"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208574 for CVE-2021-30560",
          "url": "https://bugzilla.suse.com/1208574"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211500 for CVE-2021-30560",
          "url": "https://bugzilla.suse.com/1211500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211501 for CVE-2021-30560",
          "url": "https://bugzilla.suse.com/1211501"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211544 for CVE-2021-30560",
          "url": "https://bugzilla.suse.com/1211544"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30560"
    },
    {
      "cve": "CVE-2021-30561",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30561"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30561",
          "url": "https://www.suse.com/security/cve/CVE-2021-30561"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188373 for CVE-2021-30561",
          "url": "https://bugzilla.suse.com/1188373"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30561"
    },
    {
      "cve": "CVE-2021-30562",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30562"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in WebSerial in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30562",
          "url": "https://www.suse.com/security/cve/CVE-2021-30562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188373 for CVE-2021-30562",
          "url": "https://bugzilla.suse.com/1188373"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30562"
    },
    {
      "cve": "CVE-2021-30563",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30563"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30563",
          "url": "https://www.suse.com/security/cve/CVE-2021-30563"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188373 for CVE-2021-30563",
          "url": "https://bugzilla.suse.com/1188373"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30563"
    },
    {
      "cve": "CVE-2021-30564",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30564"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in WebXR in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30564",
          "url": "https://www.suse.com/security/cve/CVE-2021-30564"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188373 for CVE-2021-30564",
          "url": "https://bugzilla.suse.com/1188373"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-30564"
    },
    {
      "cve": "CVE-2021-30590",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30590"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Bookmarks in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30590",
          "url": "https://www.suse.com/security/cve/CVE-2021-30590"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189006 for CVE-2021-30590",
          "url": "https://bugzilla.suse.com/1189006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30590"
    },
    {
      "cve": "CVE-2021-30591",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30591"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in File System API in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30591",
          "url": "https://www.suse.com/security/cve/CVE-2021-30591"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189006 for CVE-2021-30591",
          "url": "https://bugzilla.suse.com/1189006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30591"
    },
    {
      "cve": "CVE-2021-30592",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30592"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds write in Tab Groups in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30592",
          "url": "https://www.suse.com/security/cve/CVE-2021-30592"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189006 for CVE-2021-30592",
          "url": "https://bugzilla.suse.com/1189006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30592"
    },
    {
      "cve": "CVE-2021-30593",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30593"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds read in Tab Strip in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30593",
          "url": "https://www.suse.com/security/cve/CVE-2021-30593"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189006 for CVE-2021-30593",
          "url": "https://bugzilla.suse.com/1189006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30593"
    },
    {
      "cve": "CVE-2021-30594",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30594"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Page Info UI in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30594",
          "url": "https://www.suse.com/security/cve/CVE-2021-30594"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189006 for CVE-2021-30594",
          "url": "https://bugzilla.suse.com/1189006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30594"
    },
    {
      "cve": "CVE-2021-30596",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30596"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect security UI in Navigation in Google Chrome on Android prior to 92.0.4515.131 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30596",
          "url": "https://www.suse.com/security/cve/CVE-2021-30596"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189006 for CVE-2021-30596",
          "url": "https://bugzilla.suse.com/1189006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30596"
    },
    {
      "cve": "CVE-2021-30597",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30597"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Browser UI in Google Chrome on Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30597",
          "url": "https://www.suse.com/security/cve/CVE-2021-30597"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189006 for CVE-2021-30597",
          "url": "https://bugzilla.suse.com/1189006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30597"
    },
    {
      "cve": "CVE-2021-30598",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30598"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30598",
          "url": "https://www.suse.com/security/cve/CVE-2021-30598"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189490 for CVE-2021-30598",
          "url": "https://bugzilla.suse.com/1189490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30598"
    },
    {
      "cve": "CVE-2021-30599",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30599"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30599",
          "url": "https://www.suse.com/security/cve/CVE-2021-30599"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189490 for CVE-2021-30599",
          "url": "https://bugzilla.suse.com/1189490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30599"
    },
    {
      "cve": "CVE-2021-30600",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30600"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Printing in Google Chrome prior to 92.0.4515.159 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30600",
          "url": "https://www.suse.com/security/cve/CVE-2021-30600"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189490 for CVE-2021-30600",
          "url": "https://bugzilla.suse.com/1189490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30600"
    },
    {
      "cve": "CVE-2021-30601",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30601"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30601",
          "url": "https://www.suse.com/security/cve/CVE-2021-30601"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189490 for CVE-2021-30601",
          "url": "https://bugzilla.suse.com/1189490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30601"
    },
    {
      "cve": "CVE-2021-30602",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30602"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in WebRTC in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to visit a malicious website to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30602",
          "url": "https://www.suse.com/security/cve/CVE-2021-30602"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189490 for CVE-2021-30602",
          "url": "https://bugzilla.suse.com/1189490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30602"
    },
    {
      "cve": "CVE-2021-30603",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30603"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Data race in WebAudio in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30603",
          "url": "https://www.suse.com/security/cve/CVE-2021-30603"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189490 for CVE-2021-30603",
          "url": "https://bugzilla.suse.com/1189490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30603"
    },
    {
      "cve": "CVE-2021-30604",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30604"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in ANGLE in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30604",
          "url": "https://www.suse.com/security/cve/CVE-2021-30604"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189490 for CVE-2021-30604",
          "url": "https://bugzilla.suse.com/1189490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30604"
    },
    {
      "cve": "CVE-2021-30606",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30606"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30606 Use after free in Blink",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30606",
          "url": "https://www.suse.com/security/cve/CVE-2021-30606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30606",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30606"
    },
    {
      "cve": "CVE-2021-30607",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30607"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30607 Use after free in Permissions",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30607",
          "url": "https://www.suse.com/security/cve/CVE-2021-30607"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30607",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30607"
    },
    {
      "cve": "CVE-2021-30608",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30608"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30608 Use after free in Web Share",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30608",
          "url": "https://www.suse.com/security/cve/CVE-2021-30608"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30608",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30608"
    },
    {
      "cve": "CVE-2021-30609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30609 Use after free in Sign-In",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30609",
          "url": "https://www.suse.com/security/cve/CVE-2021-30609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30609",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30609"
    },
    {
      "cve": "CVE-2021-30610",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30610"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30610 Use after free in Extensions API",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30610",
          "url": "https://www.suse.com/security/cve/CVE-2021-30610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30610",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30610"
    },
    {
      "cve": "CVE-2021-30611",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30611"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30611 Use after free in WebRTC",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30611",
          "url": "https://www.suse.com/security/cve/CVE-2021-30611"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30611",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30611"
    },
    {
      "cve": "CVE-2021-30612",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30612"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30612 Use after free in WebRTC",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30612",
          "url": "https://www.suse.com/security/cve/CVE-2021-30612"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30612",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30612"
    },
    {
      "cve": "CVE-2021-30613",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30613"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30613 Use after free in Base internals",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30613",
          "url": "https://www.suse.com/security/cve/CVE-2021-30613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30613",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30613"
    },
    {
      "cve": "CVE-2021-30614",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30614"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30614",
          "url": "https://www.suse.com/security/cve/CVE-2021-30614"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30614",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30614"
    },
    {
      "cve": "CVE-2021-30615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30615 Cross-origin data leak in Navigation",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30615",
          "url": "https://www.suse.com/security/cve/CVE-2021-30615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30615",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30615"
    },
    {
      "cve": "CVE-2021-30616",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30616"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30616 Use after free in Media",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30616",
          "url": "https://www.suse.com/security/cve/CVE-2021-30616"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30616",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30616"
    },
    {
      "cve": "CVE-2021-30617",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30617"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30617 Policy bypass in Blink",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30617",
          "url": "https://www.suse.com/security/cve/CVE-2021-30617"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30617",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30617"
    },
    {
      "cve": "CVE-2021-30618",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30618"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30618 Inappropriate implementation in DevTools",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30618",
          "url": "https://www.suse.com/security/cve/CVE-2021-30618"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30618",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30618"
    },
    {
      "cve": "CVE-2021-30619",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30619"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30619 UI Spoofing in Autofill",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30619",
          "url": "https://www.suse.com/security/cve/CVE-2021-30619"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30619",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30619"
    },
    {
      "cve": "CVE-2021-30620",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30620"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30620",
          "url": "https://www.suse.com/security/cve/CVE-2021-30620"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30620",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30620"
    },
    {
      "cve": "CVE-2021-30621",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30621"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30621 UI Spoofing in Autofill",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30621",
          "url": "https://www.suse.com/security/cve/CVE-2021-30621"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30621",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30621"
    },
    {
      "cve": "CVE-2021-30622",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30622"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30622 Use after free in WebApp Installs",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30622",
          "url": "https://www.suse.com/security/cve/CVE-2021-30622"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30622",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30622"
    },
    {
      "cve": "CVE-2021-30623",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30623"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30623 Use after free in Bookmarks",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30623",
          "url": "https://www.suse.com/security/cve/CVE-2021-30623"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30623",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30623"
    },
    {
      "cve": "CVE-2021-30624",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30624"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Chromium: CVE-2021-30624 Use after free in Autofill",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30624",
          "url": "https://www.suse.com/security/cve/CVE-2021-30624"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190096 for CVE-2021-30624",
          "url": "https://bugzilla.suse.com/1190096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-30624"
    },
    {
      "cve": "CVE-2021-30625",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30625"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30625",
          "url": "https://www.suse.com/security/cve/CVE-2021-30625"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190476 for CVE-2021-30625",
          "url": "https://bugzilla.suse.com/1190476"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-30625"
    },
    {
      "cve": "CVE-2021-30626",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30626"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30626",
          "url": "https://www.suse.com/security/cve/CVE-2021-30626"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190476 for CVE-2021-30626",
          "url": "https://bugzilla.suse.com/1190476"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-30626"
    },
    {
      "cve": "CVE-2021-30627",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30627"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30627",
          "url": "https://www.suse.com/security/cve/CVE-2021-30627"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190476 for CVE-2021-30627",
          "url": "https://bugzilla.suse.com/1190476"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-30627"
    },
    {
      "cve": "CVE-2021-30628",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30628"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30628",
          "url": "https://www.suse.com/security/cve/CVE-2021-30628"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190476 for CVE-2021-30628",
          "url": "https://bugzilla.suse.com/1190476"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-30628"
    },
    {
      "cve": "CVE-2021-30629",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30629"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30629",
          "url": "https://www.suse.com/security/cve/CVE-2021-30629"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190476 for CVE-2021-30629",
          "url": "https://bugzilla.suse.com/1190476"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-30629"
    },
    {
      "cve": "CVE-2021-30630",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30630"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30630",
          "url": "https://www.suse.com/security/cve/CVE-2021-30630"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190476 for CVE-2021-30630",
          "url": "https://bugzilla.suse.com/1190476"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-30630"
    },
    {
      "cve": "CVE-2021-30631",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30631"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30631",
          "url": "https://www.suse.com/security/cve/CVE-2021-30631"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190476 for CVE-2021-30631",
          "url": "https://bugzilla.suse.com/1190476"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-30631"
    },
    {
      "cve": "CVE-2021-30632",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30632"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30632",
          "url": "https://www.suse.com/security/cve/CVE-2021-30632"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190476 for CVE-2021-30632",
          "url": "https://bugzilla.suse.com/1190476"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-30632"
    },
    {
      "cve": "CVE-2021-30633",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-30633"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-30633",
          "url": "https://www.suse.com/security/cve/CVE-2021-30633"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190476 for CVE-2021-30633",
          "url": "https://bugzilla.suse.com/1190476"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-30633"
    },
    {
      "cve": "CVE-2021-37974",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37974"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Safebrowsing in Google Chrome prior to 94.0.4606.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37974",
          "url": "https://www.suse.com/security/cve/CVE-2021-37974"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191204 for CVE-2021-37974",
          "url": "https://bugzilla.suse.com/1191204"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37974"
    },
    {
      "cve": "CVE-2021-37975",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37975"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37975",
          "url": "https://www.suse.com/security/cve/CVE-2021-37975"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191204 for CVE-2021-37975",
          "url": "https://bugzilla.suse.com/1191204"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37975"
    },
    {
      "cve": "CVE-2021-37976",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37976"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37976",
          "url": "https://www.suse.com/security/cve/CVE-2021-37976"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191204 for CVE-2021-37976",
          "url": "https://bugzilla.suse.com/1191204"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37976"
    },
    {
      "cve": "CVE-2021-37977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Garbage Collection in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37977",
          "url": "https://www.suse.com/security/cve/CVE-2021-37977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191463 for CVE-2021-37977",
          "url": "https://bugzilla.suse.com/1191463"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37977"
    },
    {
      "cve": "CVE-2021-37978",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37978"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Blink in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37978",
          "url": "https://www.suse.com/security/cve/CVE-2021-37978"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191463 for CVE-2021-37978",
          "url": "https://bugzilla.suse.com/1191463"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37978"
    },
    {
      "cve": "CVE-2021-37979",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37979"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "heap buffer overflow in WebRTC in Google Chrome prior to 94.0.4606.81 allowed a remote attacker who convinced a user to browse to a malicious website to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37979",
          "url": "https://www.suse.com/security/cve/CVE-2021-37979"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191463 for CVE-2021-37979",
          "url": "https://bugzilla.suse.com/1191463"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37979"
    },
    {
      "cve": "CVE-2021-37980",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37980"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37980",
          "url": "https://www.suse.com/security/cve/CVE-2021-37980"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191463 for CVE-2021-37980",
          "url": "https://bugzilla.suse.com/1191463"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37980"
    },
    {
      "cve": "CVE-2021-37981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Skia in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37981",
          "url": "https://www.suse.com/security/cve/CVE-2021-37981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37981",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37981"
    },
    {
      "cve": "CVE-2021-37982",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37982"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Incognito in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37982",
          "url": "https://www.suse.com/security/cve/CVE-2021-37982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37982",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37982"
    },
    {
      "cve": "CVE-2021-37983",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37983"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Dev Tools in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37983",
          "url": "https://www.suse.com/security/cve/CVE-2021-37983"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37983",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37983"
    },
    {
      "cve": "CVE-2021-37984",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37984"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in PDFium in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37984",
          "url": "https://www.suse.com/security/cve/CVE-2021-37984"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37984",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37984"
    },
    {
      "cve": "CVE-2021-37985",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37985"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had convinced a user to allow for connection to debugger to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37985",
          "url": "https://www.suse.com/security/cve/CVE-2021-37985"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37985",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37985"
    },
    {
      "cve": "CVE-2021-37986",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37986"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Settings in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to engage with Dev Tools to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37986",
          "url": "https://www.suse.com/security/cve/CVE-2021-37986"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37986",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37986"
    },
    {
      "cve": "CVE-2021-37987",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37987"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Network APIs in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37987",
          "url": "https://www.suse.com/security/cve/CVE-2021-37987"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37987",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37987"
    },
    {
      "cve": "CVE-2021-37988",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37988"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Profiles in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who convinced a user to engage in specific gestures to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37988",
          "url": "https://www.suse.com/security/cve/CVE-2021-37988"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37988",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37988"
    },
    {
      "cve": "CVE-2021-37989",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37989"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Blink in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to abuse content security policy via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37989",
          "url": "https://www.suse.com/security/cve/CVE-2021-37989"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37989",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37989"
    },
    {
      "cve": "CVE-2021-37990",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37990"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in WebView in Google Chrome on Android prior to 95.0.4638.54 allowed a remote attacker to leak cross-origin data via a crafted app.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37990",
          "url": "https://www.suse.com/security/cve/CVE-2021-37990"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37990",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37990"
    },
    {
      "cve": "CVE-2021-37991",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37991"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37991",
          "url": "https://www.suse.com/security/cve/CVE-2021-37991"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37991",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37991"
    },
    {
      "cve": "CVE-2021-37992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds read in WebAudio in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37992",
          "url": "https://www.suse.com/security/cve/CVE-2021-37992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37992",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37992"
    },
    {
      "cve": "CVE-2021-37993",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37993"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in PDF Accessibility in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37993",
          "url": "https://www.suse.com/security/cve/CVE-2021-37993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37993",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37993"
    },
    {
      "cve": "CVE-2021-37994",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37994"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37994",
          "url": "https://www.suse.com/security/cve/CVE-2021-37994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37994",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37994"
    },
    {
      "cve": "CVE-2021-37995",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37995"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37995",
          "url": "https://www.suse.com/security/cve/CVE-2021-37995"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37995",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37995"
    },
    {
      "cve": "CVE-2021-37996",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37996"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient validation of untrusted input Downloads in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a malicious file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37996",
          "url": "https://www.suse.com/security/cve/CVE-2021-37996"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191844 for CVE-2021-37996",
          "url": "https://bugzilla.suse.com/1191844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37996"
    },
    {
      "cve": "CVE-2021-37997",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37997"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Sign-In in Google Chrome prior to 95.0.4638.69 allowed a remote attacker who convinced a user to sign into Chrome to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37997",
          "url": "https://www.suse.com/security/cve/CVE-2021-37997"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192184 for CVE-2021-37997",
          "url": "https://bugzilla.suse.com/1192184"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-37997"
    },
    {
      "cve": "CVE-2021-37998",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37998"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Garbage Collection in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37998",
          "url": "https://www.suse.com/security/cve/CVE-2021-37998"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192184 for CVE-2021-37998",
          "url": "https://bugzilla.suse.com/1192184"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-37998"
    },
    {
      "cve": "CVE-2021-37999",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37999"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient data validation in New Tab Page in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to inject arbitrary scripts or HTML in a new browser tab via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37999",
          "url": "https://www.suse.com/security/cve/CVE-2021-37999"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192184 for CVE-2021-37999",
          "url": "https://bugzilla.suse.com/1192184"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-37999"
    },
    {
      "cve": "CVE-2021-38001",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38001"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38001",
          "url": "https://www.suse.com/security/cve/CVE-2021-38001"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192184 for CVE-2021-38001",
          "url": "https://bugzilla.suse.com/1192184"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38001"
    },
    {
      "cve": "CVE-2021-38002",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38002"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Web Transport in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38002",
          "url": "https://www.suse.com/security/cve/CVE-2021-38002"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192184 for CVE-2021-38002",
          "url": "https://bugzilla.suse.com/1192184"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38002"
    },
    {
      "cve": "CVE-2021-38003",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38003"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38003",
          "url": "https://www.suse.com/security/cve/CVE-2021-38003"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192184 for CVE-2021-38003",
          "url": "https://bugzilla.suse.com/1192184"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38003"
    },
    {
      "cve": "CVE-2021-38004",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38004"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient policy enforcement in Autofill in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38004",
          "url": "https://www.suse.com/security/cve/CVE-2021-38004"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38004"
    },
    {
      "cve": "CVE-2021-38005",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38005"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in loader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38005",
          "url": "https://www.suse.com/security/cve/CVE-2021-38005"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38005",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38005"
    },
    {
      "cve": "CVE-2021-38006",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38006"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38006",
          "url": "https://www.suse.com/security/cve/CVE-2021-38006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38006",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38006"
    },
    {
      "cve": "CVE-2021-38007",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38007"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38007",
          "url": "https://www.suse.com/security/cve/CVE-2021-38007"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38007",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38007"
    },
    {
      "cve": "CVE-2021-38008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in media in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38008",
          "url": "https://www.suse.com/security/cve/CVE-2021-38008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38008",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38008"
    },
    {
      "cve": "CVE-2021-38009",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38009"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in cache in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38009",
          "url": "https://www.suse.com/security/cve/CVE-2021-38009"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38009",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38009"
    },
    {
      "cve": "CVE-2021-38010",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38010"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in service workers in Google Chrome prior to 96.0.4664.45 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38010",
          "url": "https://www.suse.com/security/cve/CVE-2021-38010"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38010",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38010"
    },
    {
      "cve": "CVE-2021-38011",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38011"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38011",
          "url": "https://www.suse.com/security/cve/CVE-2021-38011"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38011",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38011"
    },
    {
      "cve": "CVE-2021-38012",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38012"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38012",
          "url": "https://www.suse.com/security/cve/CVE-2021-38012"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38012",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38012"
    },
    {
      "cve": "CVE-2021-38013",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38013"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in fingerprint recognition in Google Chrome on ChromeOS prior to 96.0.4664.45 allowed a remote attacker who had compromised a WebUI renderer process to potentially perform a sandbox escape via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38013",
          "url": "https://www.suse.com/security/cve/CVE-2021-38013"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38013",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38013"
    },
    {
      "cve": "CVE-2021-38014",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38014"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds write in Swiftshader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38014",
          "url": "https://www.suse.com/security/cve/CVE-2021-38014"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38014",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38014"
    },
    {
      "cve": "CVE-2021-38015",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38015"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in input in Google Chrome prior to 96.0.4664.45 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38015",
          "url": "https://www.suse.com/security/cve/CVE-2021-38015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38015",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38015"
    },
    {
      "cve": "CVE-2021-38016",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38016"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient policy enforcement in background fetch in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass same origin policy via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38016",
          "url": "https://www.suse.com/security/cve/CVE-2021-38016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38016",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38016"
    },
    {
      "cve": "CVE-2021-38017",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38017"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient policy enforcement in iframe sandbox in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38017",
          "url": "https://www.suse.com/security/cve/CVE-2021-38017"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38017",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38017"
    },
    {
      "cve": "CVE-2021-38019",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38019"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient policy enforcement in CORS in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38019",
          "url": "https://www.suse.com/security/cve/CVE-2021-38019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38019",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38019"
    },
    {
      "cve": "CVE-2021-38020",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38020"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient policy enforcement in contacts picker in Google Chrome on Android prior to 96.0.4664.45 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38020",
          "url": "https://www.suse.com/security/cve/CVE-2021-38020"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38020",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38020"
    },
    {
      "cve": "CVE-2021-38021",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38021"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in referrer in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38021",
          "url": "https://www.suse.com/security/cve/CVE-2021-38021"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38021",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38021"
    },
    {
      "cve": "CVE-2021-38022",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38022"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38022",
          "url": "https://www.suse.com/security/cve/CVE-2021-38022"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192734 for CVE-2021-38022",
          "url": "https://bugzilla.suse.com/1192734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-38022"
    },
    {
      "cve": "CVE-2021-4052",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4052"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in web apps in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4052",
          "url": "https://www.suse.com/security/cve/CVE-2021-4052"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4052",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4052"
    },
    {
      "cve": "CVE-2021-4053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in UI in Google Chrome on Linux prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4053",
          "url": "https://www.suse.com/security/cve/CVE-2021-4053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4053",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4053"
    },
    {
      "cve": "CVE-2021-4054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect security UI in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4054",
          "url": "https://www.suse.com/security/cve/CVE-2021-4054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4054",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4054"
    },
    {
      "cve": "CVE-2021-4055",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4055"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4055",
          "url": "https://www.suse.com/security/cve/CVE-2021-4055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4055",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4055"
    },
    {
      "cve": "CVE-2021-4056",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4056"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4056",
          "url": "https://www.suse.com/security/cve/CVE-2021-4056"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4056",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4056"
    },
    {
      "cve": "CVE-2021-4057",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4057"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4057",
          "url": "https://www.suse.com/security/cve/CVE-2021-4057"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4057",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4057"
    },
    {
      "cve": "CVE-2021-4058",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4058"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4058",
          "url": "https://www.suse.com/security/cve/CVE-2021-4058"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4058",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4058"
    },
    {
      "cve": "CVE-2021-4059",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4059"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4059",
          "url": "https://www.suse.com/security/cve/CVE-2021-4059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4059",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4059"
    },
    {
      "cve": "CVE-2021-4061",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4061"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4061",
          "url": "https://www.suse.com/security/cve/CVE-2021-4061"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4061",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4061"
    },
    {
      "cve": "CVE-2021-4062",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4062"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4062",
          "url": "https://www.suse.com/security/cve/CVE-2021-4062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4062",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4062"
    },
    {
      "cve": "CVE-2021-4063",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4063"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4063",
          "url": "https://www.suse.com/security/cve/CVE-2021-4063"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4063",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4063"
    },
    {
      "cve": "CVE-2021-4064",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4064"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in screen capture in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4064",
          "url": "https://www.suse.com/security/cve/CVE-2021-4064"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4064",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4064"
    },
    {
      "cve": "CVE-2021-4065",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4065"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4065",
          "url": "https://www.suse.com/security/cve/CVE-2021-4065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4065",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4065"
    },
    {
      "cve": "CVE-2021-4066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4066",
          "url": "https://www.suse.com/security/cve/CVE-2021-4066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4066",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4066"
    },
    {
      "cve": "CVE-2021-4067",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4067"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4067",
          "url": "https://www.suse.com/security/cve/CVE-2021-4067"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4067",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4067"
    },
    {
      "cve": "CVE-2021-4068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient data validation in new tab page in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4068",
          "url": "https://www.suse.com/security/cve/CVE-2021-4068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4068",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4068"
    },
    {
      "cve": "CVE-2021-4078",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4078"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4078",
          "url": "https://www.suse.com/security/cve/CVE-2021-4078"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4078",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4078"
    },
    {
      "cve": "CVE-2021-4079",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4079"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via crafted WebRTC packets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4079",
          "url": "https://www.suse.com/security/cve/CVE-2021-4079"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193519 for CVE-2021-4079",
          "url": "https://bugzilla.suse.com/1193519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4079"
    },
    {
      "cve": "CVE-2021-4098",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4098"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4098",
          "url": "https://www.suse.com/security/cve/CVE-2021-4098"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193713 for CVE-2021-4098",
          "url": "https://bugzilla.suse.com/1193713"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4098"
    },
    {
      "cve": "CVE-2021-4099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4099",
          "url": "https://www.suse.com/security/cve/CVE-2021-4099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193713 for CVE-2021-4099",
          "url": "https://bugzilla.suse.com/1193713"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4099"
    },
    {
      "cve": "CVE-2021-4100",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4100"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Object lifecycle issue in ANGLE in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4100",
          "url": "https://www.suse.com/security/cve/CVE-2021-4100"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193713 for CVE-2021-4100",
          "url": "https://bugzilla.suse.com/1193713"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4100"
    },
    {
      "cve": "CVE-2021-4101",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4101"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4101",
          "url": "https://www.suse.com/security/cve/CVE-2021-4101"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193713 for CVE-2021-4101",
          "url": "https://bugzilla.suse.com/1193713"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4101"
    },
    {
      "cve": "CVE-2021-4102",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4102"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4102",
          "url": "https://www.suse.com/security/cve/CVE-2021-4102"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193713 for CVE-2021-4102",
          "url": "https://bugzilla.suse.com/1193713"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4102"
    },
    {
      "cve": "CVE-2022-0096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Storage in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0096",
          "url": "https://www.suse.com/security/cve/CVE-2022-0096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0096",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0096",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0096"
    },
    {
      "cve": "CVE-2022-0097",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0097"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in DevTools in Google Chrome prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to to potentially allow extension to escape the sandbox via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0097",
          "url": "https://www.suse.com/security/cve/CVE-2022-0097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0097",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0097",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0097"
    },
    {
      "cve": "CVE-2022-0098",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0098"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Screen Capture in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gestures.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0098",
          "url": "https://www.suse.com/security/cve/CVE-2022-0098"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0098",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0098",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0098"
    },
    {
      "cve": "CVE-2022-0099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Sign-in in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gesture.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0099",
          "url": "https://www.suse.com/security/cve/CVE-2022-0099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0099",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0099",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0099"
    },
    {
      "cve": "CVE-2022-0100",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0100"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Media streams API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0100",
          "url": "https://www.suse.com/security/cve/CVE-2022-0100"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0100",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0100",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0100"
    },
    {
      "cve": "CVE-2022-0101",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0101"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Bookmarks in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via specific user gesture.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0101",
          "url": "https://www.suse.com/security/cve/CVE-2022-0101"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0101",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0101",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0101"
    },
    {
      "cve": "CVE-2022-0102",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0102"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0102",
          "url": "https://www.suse.com/security/cve/CVE-2022-0102"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0102",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0102",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0102"
    },
    {
      "cve": "CVE-2022-0103",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0103"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in SwiftShader in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0103",
          "url": "https://www.suse.com/security/cve/CVE-2022-0103"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0103",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0103",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0103"
    },
    {
      "cve": "CVE-2022-0104",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0104"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in ANGLE in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0104",
          "url": "https://www.suse.com/security/cve/CVE-2022-0104"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0104",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0104",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0104"
    },
    {
      "cve": "CVE-2022-0105",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0105"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in PDF Accessibility in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0105",
          "url": "https://www.suse.com/security/cve/CVE-2022-0105"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0105",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0105",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0105"
    },
    {
      "cve": "CVE-2022-0106",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0106"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0106",
          "url": "https://www.suse.com/security/cve/CVE-2022-0106"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0106",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0106",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0106"
    },
    {
      "cve": "CVE-2022-0107",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0107"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in File Manager API in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0107",
          "url": "https://www.suse.com/security/cve/CVE-2022-0107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0107",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0107",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0107"
    },
    {
      "cve": "CVE-2022-0108",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0108"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0108",
          "url": "https://www.suse.com/security/cve/CVE-2022-0108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0108",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210731 for CVE-2022-0108",
          "url": "https://bugzilla.suse.com/1210731"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0108",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0108"
    },
    {
      "cve": "CVE-2022-0109",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0109"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0109",
          "url": "https://www.suse.com/security/cve/CVE-2022-0109"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0109",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0109",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0109"
    },
    {
      "cve": "CVE-2022-0110",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0110"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect security UI in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0110",
          "url": "https://www.suse.com/security/cve/CVE-2022-0110"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0110",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0110",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0110"
    },
    {
      "cve": "CVE-2022-0111",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0111"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to incorrectly set origin via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0111",
          "url": "https://www.suse.com/security/cve/CVE-2022-0111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0111",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0111",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0111"
    },
    {
      "cve": "CVE-2022-0112",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0112"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect security UI in Browser UI in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to display missing URL or incorrect URL via a crafted URL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0112",
          "url": "https://www.suse.com/security/cve/CVE-2022-0112"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0112",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0112",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0112"
    },
    {
      "cve": "CVE-2022-0113",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0113"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0113",
          "url": "https://www.suse.com/security/cve/CVE-2022-0113"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0113",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0113",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0113"
    },
    {
      "cve": "CVE-2022-0114",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0114"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds memory access in Blink Serial API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page and virtual serial port driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0114",
          "url": "https://www.suse.com/security/cve/CVE-2022-0114"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0114",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0114",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0114"
    },
    {
      "cve": "CVE-2022-0115",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0115"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Uninitialized use in File API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0115",
          "url": "https://www.suse.com/security/cve/CVE-2022-0115"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0115",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0115",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0115"
    },
    {
      "cve": "CVE-2022-0116",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0116"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Compositing in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0116",
          "url": "https://www.suse.com/security/cve/CVE-2022-0116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0116",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0116",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0116"
    },
    {
      "cve": "CVE-2022-0117",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0117"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Policy bypass in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0117",
          "url": "https://www.suse.com/security/cve/CVE-2022-0117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0117",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0117",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0117"
    },
    {
      "cve": "CVE-2022-0118",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0118"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in WebShare in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0118",
          "url": "https://www.suse.com/security/cve/CVE-2022-0118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0118",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0118",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0118"
    },
    {
      "cve": "CVE-2022-0120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Passwords in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially leak cross-origin data via a malicious website.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0120",
          "url": "https://www.suse.com/security/cve/CVE-2022-0120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194331 for CVE-2022-0120",
          "url": "https://bugzilla.suse.com/1194331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213802 for CVE-2022-0120",
          "url": "https://bugzilla.suse.com/1213802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0120"
    },
    {
      "cve": "CVE-2022-0289",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0289"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Safe browsing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0289",
          "url": "https://www.suse.com/security/cve/CVE-2022-0289"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0289",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0289"
    },
    {
      "cve": "CVE-2022-0290",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0290"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Site isolation in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0290",
          "url": "https://www.suse.com/security/cve/CVE-2022-0290"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0290",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0290"
    },
    {
      "cve": "CVE-2022-0291",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0291"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Storage in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0291",
          "url": "https://www.suse.com/security/cve/CVE-2022-0291"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0291",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0291"
    },
    {
      "cve": "CVE-2022-0292",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0292"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Fenced Frames in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0292",
          "url": "https://www.suse.com/security/cve/CVE-2022-0292"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0292",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0292"
    },
    {
      "cve": "CVE-2022-0293",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0293"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Web packaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0293",
          "url": "https://www.suse.com/security/cve/CVE-2022-0293"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0293",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0293"
    },
    {
      "cve": "CVE-2022-0294",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0294"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Push messaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0294",
          "url": "https://www.suse.com/security/cve/CVE-2022-0294"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0294",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0294"
    },
    {
      "cve": "CVE-2022-0295",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0295"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced the user to engage is specific user interactions to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0295",
          "url": "https://www.suse.com/security/cve/CVE-2022-0295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0295",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0295"
    },
    {
      "cve": "CVE-2022-0296",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0296"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Printing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced the user to engage is specific user interactions to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0296",
          "url": "https://www.suse.com/security/cve/CVE-2022-0296"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0296",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0296"
    },
    {
      "cve": "CVE-2022-0297",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0297"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Vulkan in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0297",
          "url": "https://www.suse.com/security/cve/CVE-2022-0297"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0297",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0297"
    },
    {
      "cve": "CVE-2022-0298",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0298"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Scheduling in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0298",
          "url": "https://www.suse.com/security/cve/CVE-2022-0298"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0298",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0298"
    },
    {
      "cve": "CVE-2022-0300",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0300"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Text Input Method Editor in Google Chrome on Android prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0300",
          "url": "https://www.suse.com/security/cve/CVE-2022-0300"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0300",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0300"
    },
    {
      "cve": "CVE-2022-0301",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0301"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in DevTools in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0301",
          "url": "https://www.suse.com/security/cve/CVE-2022-0301"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0301",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0301"
    },
    {
      "cve": "CVE-2022-0302",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0302"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0302",
          "url": "https://www.suse.com/security/cve/CVE-2022-0302"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0302",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0302"
    },
    {
      "cve": "CVE-2022-0304",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0304"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Bookmarks in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0304",
          "url": "https://www.suse.com/security/cve/CVE-2022-0304"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0304",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0304"
    },
    {
      "cve": "CVE-2022-0305",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0305"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Service Worker API in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0305",
          "url": "https://www.suse.com/security/cve/CVE-2022-0305"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0305",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0305"
    },
    {
      "cve": "CVE-2022-0306",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0306"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in PDFium in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0306",
          "url": "https://www.suse.com/security/cve/CVE-2022-0306"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0306",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0306"
    },
    {
      "cve": "CVE-2022-0307",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0307"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Optimization Guide in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0307",
          "url": "https://www.suse.com/security/cve/CVE-2022-0307"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0307",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0307"
    },
    {
      "cve": "CVE-2022-0308",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0308"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Data Transfer in Google Chrome on Chrome OS prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0308",
          "url": "https://www.suse.com/security/cve/CVE-2022-0308"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0308",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0308"
    },
    {
      "cve": "CVE-2022-0309",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0309"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0309",
          "url": "https://www.suse.com/security/cve/CVE-2022-0309"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0309",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0309"
    },
    {
      "cve": "CVE-2022-0310",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0310"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via specific user interactions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0310",
          "url": "https://www.suse.com/security/cve/CVE-2022-0310"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0310",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0310"
    },
    {
      "cve": "CVE-2022-0311",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0311"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0311",
          "url": "https://www.suse.com/security/cve/CVE-2022-0311"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194919 for CVE-2022-0311",
          "url": "https://bugzilla.suse.com/1194919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0311"
    },
    {
      "cve": "CVE-2022-0452",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0452"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Safe Browsing in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0452",
          "url": "https://www.suse.com/security/cve/CVE-2022-0452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0452",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0452"
    },
    {
      "cve": "CVE-2022-0453",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0453"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Reader Mode in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0453",
          "url": "https://www.suse.com/security/cve/CVE-2022-0453"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0453",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0453"
    },
    {
      "cve": "CVE-2022-0454",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0454"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in ANGLE in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0454",
          "url": "https://www.suse.com/security/cve/CVE-2022-0454"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0454",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0454"
    },
    {
      "cve": "CVE-2022-0455",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0455"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 98.0.4758.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0455",
          "url": "https://www.suse.com/security/cve/CVE-2022-0455"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0455",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0455"
    },
    {
      "cve": "CVE-2022-0456",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0456"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Web Search in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via profile destruction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0456",
          "url": "https://www.suse.com/security/cve/CVE-2022-0456"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0456",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0456"
    },
    {
      "cve": "CVE-2022-0457",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0457"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0457",
          "url": "https://www.suse.com/security/cve/CVE-2022-0457"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0457",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0457"
    },
    {
      "cve": "CVE-2022-0458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Thumbnail Tab Strip in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0458",
          "url": "https://www.suse.com/security/cve/CVE-2022-0458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0458",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0458"
    },
    {
      "cve": "CVE-2022-0459",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0459"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Screen Capture in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process and convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0459",
          "url": "https://www.suse.com/security/cve/CVE-2022-0459"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0459",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0459"
    },
    {
      "cve": "CVE-2022-0460",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0460"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Window Dialogue in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0460",
          "url": "https://www.suse.com/security/cve/CVE-2022-0460"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0460",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0460"
    },
    {
      "cve": "CVE-2022-0461",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0461"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Policy bypass in COOP in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to bypass iframe sandbox via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0461",
          "url": "https://www.suse.com/security/cve/CVE-2022-0461"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0461",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0461"
    },
    {
      "cve": "CVE-2022-0462",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0462"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0462",
          "url": "https://www.suse.com/security/cve/CVE-2022-0462"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0462",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0462"
    },
    {
      "cve": "CVE-2022-0463",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0463"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0463",
          "url": "https://www.suse.com/security/cve/CVE-2022-0463"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0463",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0463"
    },
    {
      "cve": "CVE-2022-0464",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0464"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0464",
          "url": "https://www.suse.com/security/cve/CVE-2022-0464"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0464",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0464"
    },
    {
      "cve": "CVE-2022-0465",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0465"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Extensions in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via user interaction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0465",
          "url": "https://www.suse.com/security/cve/CVE-2022-0465"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0465",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0465"
    },
    {
      "cve": "CVE-2022-0466",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0466"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Extensions Platform in Google Chrome prior to 98.0.4758.80 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0466",
          "url": "https://www.suse.com/security/cve/CVE-2022-0466"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0466",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0466"
    },
    {
      "cve": "CVE-2022-0467",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0467"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Pointer Lock in Google Chrome on Windows prior to 98.0.4758.80 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0467",
          "url": "https://www.suse.com/security/cve/CVE-2022-0467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0467",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0467"
    },
    {
      "cve": "CVE-2022-0468",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0468"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Payments in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0468",
          "url": "https://www.suse.com/security/cve/CVE-2022-0468"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0468",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0468"
    },
    {
      "cve": "CVE-2022-0469",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0469"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Cast in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific interactions to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0469",
          "url": "https://www.suse.com/security/cve/CVE-2022-0469"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0469",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0469"
    },
    {
      "cve": "CVE-2022-0470",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0470"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds memory access in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0470",
          "url": "https://www.suse.com/security/cve/CVE-2022-0470"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195420 for CVE-2022-0470",
          "url": "https://bugzilla.suse.com/1195420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0470"
    },
    {
      "cve": "CVE-2022-0603",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0603"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in File Manager in Google Chrome on Chrome OS prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0603",
          "url": "https://www.suse.com/security/cve/CVE-2022-0603"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195986 for CVE-2022-0603",
          "url": "https://bugzilla.suse.com/1195986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0603"
    },
    {
      "cve": "CVE-2022-0604",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0604"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Tab Groups in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0604",
          "url": "https://www.suse.com/security/cve/CVE-2022-0604"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195986 for CVE-2022-0604",
          "url": "https://bugzilla.suse.com/1195986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0604"
    },
    {
      "cve": "CVE-2022-0605",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0605"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Webstore API in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and convinced a user to enage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0605",
          "url": "https://www.suse.com/security/cve/CVE-2022-0605"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195986 for CVE-2022-0605",
          "url": "https://bugzilla.suse.com/1195986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0605"
    },
    {
      "cve": "CVE-2022-0606",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0606"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in ANGLE in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0606",
          "url": "https://www.suse.com/security/cve/CVE-2022-0606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195986 for CVE-2022-0606",
          "url": "https://bugzilla.suse.com/1195986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0606"
    },
    {
      "cve": "CVE-2022-0607",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0607"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in GPU in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0607",
          "url": "https://www.suse.com/security/cve/CVE-2022-0607"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195986 for CVE-2022-0607",
          "url": "https://bugzilla.suse.com/1195986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0607"
    },
    {
      "cve": "CVE-2022-0608",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0608"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer overflow in Mojo in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0608",
          "url": "https://www.suse.com/security/cve/CVE-2022-0608"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195986 for CVE-2022-0608",
          "url": "https://bugzilla.suse.com/1195986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0608"
    },
    {
      "cve": "CVE-2022-0609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0609",
          "url": "https://www.suse.com/security/cve/CVE-2022-0609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195986 for CVE-2022-0609",
          "url": "https://bugzilla.suse.com/1195986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0609"
    },
    {
      "cve": "CVE-2022-0610",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0610"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Gamepad API in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0610",
          "url": "https://www.suse.com/security/cve/CVE-2022-0610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195986 for CVE-2022-0610",
          "url": "https://bugzilla.suse.com/1195986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0610"
    },
    {
      "cve": "CVE-2022-0789",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0789"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in ANGLE in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0789",
          "url": "https://www.suse.com/security/cve/CVE-2022-0789"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0789",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0789"
    },
    {
      "cve": "CVE-2022-0790",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0790"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Cast UI in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially perform a sandbox escape via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0790",
          "url": "https://www.suse.com/security/cve/CVE-2022-0790"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0790",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0790"
    },
    {
      "cve": "CVE-2022-0791",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0791"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Omnibox in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via user interactions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0791",
          "url": "https://www.suse.com/security/cve/CVE-2022-0791"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0791",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0791"
    },
    {
      "cve": "CVE-2022-0792",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0792"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds read in ANGLE in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0792",
          "url": "https://www.suse.com/security/cve/CVE-2022-0792"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0792",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0792"
    },
    {
      "cve": "CVE-2022-0793",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0793"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Cast in Google Chrome prior to 99.0.4844.51 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted Chrome Extension.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0793",
          "url": "https://www.suse.com/security/cve/CVE-2022-0793"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0793",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0793"
    },
    {
      "cve": "CVE-2022-0794",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0794"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in WebShare in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0794",
          "url": "https://www.suse.com/security/cve/CVE-2022-0794"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0794",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0794"
    },
    {
      "cve": "CVE-2022-0795",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0795"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in Blink Layout in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0795",
          "url": "https://www.suse.com/security/cve/CVE-2022-0795"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0795",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0795"
    },
    {
      "cve": "CVE-2022-0796",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0796"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Media in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0796",
          "url": "https://www.suse.com/security/cve/CVE-2022-0796"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0796",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0796"
    },
    {
      "cve": "CVE-2022-0797",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0797"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds memory access in Mojo in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0797",
          "url": "https://www.suse.com/security/cve/CVE-2022-0797"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0797",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0797"
    },
    {
      "cve": "CVE-2022-0798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in MediaStream in Google Chrome prior to 99.0.4844.51 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0798",
          "url": "https://www.suse.com/security/cve/CVE-2022-0798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0798",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0798"
    },
    {
      "cve": "CVE-2022-0799",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0799"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient policy enforcement in Installer in Google Chrome on Windows prior to 99.0.4844.51 allowed a remote attacker to perform local privilege escalation via a crafted offline installer file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0799",
          "url": "https://www.suse.com/security/cve/CVE-2022-0799"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0799",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0799"
    },
    {
      "cve": "CVE-2022-0800",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0800"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in Cast UI in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0800",
          "url": "https://www.suse.com/security/cve/CVE-2022-0800"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0800",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0800"
    },
    {
      "cve": "CVE-2022-0801",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0801"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in HTML parser in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to bypass XSS preventions via a crafted HTML page. (Chrome security severity: Medium)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0801",
          "url": "https://www.suse.com/security/cve/CVE-2022-0801"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0801",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0801"
    },
    {
      "cve": "CVE-2022-0802",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0802"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 99.0.4844.51 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0802",
          "url": "https://www.suse.com/security/cve/CVE-2022-0802"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0802",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0802"
    },
    {
      "cve": "CVE-2022-0803",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0803"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Permissions in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to tamper with the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0803",
          "url": "https://www.suse.com/security/cve/CVE-2022-0803"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0803",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0803"
    },
    {
      "cve": "CVE-2022-0804",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0804"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 99.0.4844.51 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0804",
          "url": "https://www.suse.com/security/cve/CVE-2022-0804"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0804",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0804"
    },
    {
      "cve": "CVE-2022-0805",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0805"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Browser Switcher in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0805",
          "url": "https://www.suse.com/security/cve/CVE-2022-0805"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0805",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0805"
    },
    {
      "cve": "CVE-2022-0806",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0806"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Data leak in Canvas in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in screen sharing to potentially leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0806",
          "url": "https://www.suse.com/security/cve/CVE-2022-0806"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0806",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0806"
    },
    {
      "cve": "CVE-2022-0807",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0807"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Autofill in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0807",
          "url": "https://www.suse.com/security/cve/CVE-2022-0807"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0807",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0807"
    },
    {
      "cve": "CVE-2022-0808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Chrome OS Shell in Google Chrome on Chrome OS prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in a series of user interaction to potentially exploit heap corruption via user interactions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0808",
          "url": "https://www.suse.com/security/cve/CVE-2022-0808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0808",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0808"
    },
    {
      "cve": "CVE-2022-0809",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0809"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds memory access in WebXR in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0809",
          "url": "https://www.suse.com/security/cve/CVE-2022-0809"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196641 for CVE-2022-0809",
          "url": "https://bugzilla.suse.com/1196641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2022-0809"
    },
    {
      "cve": "CVE-2022-1096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1096",
          "url": "https://www.suse.com/security/cve/CVE-2022-1096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197552 for CVE-2022-1096",
          "url": "https://bugzilla.suse.com/1197552"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-04-08T14:01:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-1096"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.